TunnelGRE / XOR_NIM_InjectLinks
Simple shellcode injection in Nim encrypted in XOR
☆22Updated 2 years ago
Alternatives and similar repositories for XOR_NIM_Inject
Users that are interested in XOR_NIM_Inject are comparing it to the libraries listed below
Sorting:
- AutoStart teamserver and listeners with services☆74Updated 3 years ago
- Modified version of Pypykatz to print encrypted credentials☆52Updated 2 years ago
- Tomcat backdoor based on CS blog☆27Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago
- ☆53Updated 3 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Updated 3 years ago
- This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager☆48Updated last year
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 3 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆15Updated 2 years ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 4 years ago
- Cobalt Strike Aggressor script create for RTO☆15Updated last year
- Winsocket for Cobalt Strike.☆99Updated 2 years ago
- CVE-2024-23897 jenkins-cli☆15Updated last year
- ☆19Updated 2 years ago
- Lexmark CVE-2023-26067☆26Updated 2 years ago
- ownCloud exploits for CVE-2023-49105☆36Updated last year
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆61Updated 2 years ago
- Active Directory certificate abuse.☆38Updated 3 years ago
- A testing Red Team Infrastructure created with Docker☆32Updated 3 years ago
- Beacon Object Files.☆37Updated last year
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Updated last year
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆89Updated last year
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Updated last year
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆20Updated last year
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆58Updated 2 years ago
- This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers☆54Updated last year