TheFlash2k / Raidware
A C2 Framework developed as an FYP
☆10Updated last month
Alternatives and similar repositories for Raidware:
Users that are interested in Raidware are comparing it to the libraries listed below
- All the lab manuals, tasks and their solutions for the course CY243 - Penetration Testing along with a Teacher's manual for Lab Setup wil…☆15Updated last year
- post/windows/manage/enable_rdp Metaploit module in Command prompt module☆27Updated 5 years ago
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆21Updated 3 years ago
- WordPress - Authenticated XXE (CVE-2021-29447)☆42Updated 3 years ago
- Spike Fuzzer ( Spike for Archlinux ) && Audits☆11Updated 5 years ago
- Command line client for HackTheBox☆22Updated last year
- Materials from different CTFs for later reuse☆25Updated last year
- Exploits for some windows binaries :)☆46Updated last month
- Authenticated Remote Code Execution in Icinga Web 2 <2.8.6, <2.9.6, <2.10☆16Updated last year
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆95Updated 2 years ago
- [PoC] Command injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)☆88Updated 2 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- CVE-2023-2255 Libre Office☆58Updated last year
- Python script for exploiting Werkzeug Debug RCE useful for CTF☆33Updated 5 years ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆51Updated last year
- Gonna share my writeups and resources here☆62Updated last month
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 5 months ago
- My Collection of exploits, reverse shells, scripts and more☆12Updated last year
- A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell option…☆14Updated last year
- LFI to RCE via phpinfo() assistance or via controlled log file☆61Updated 2 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆52Updated 2 years ago
- Creating a Malicious Macro using MS Word☆19Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆107Updated 2 years ago
- CVE-2023-33733 reportlab RCE☆114Updated last year
- A couple of different scripts, made to automate attacks against NoSQL databases.☆63Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆44Updated 2 months ago
- CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7☆135Updated 2 years ago
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆30Updated last year
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated last month