VladRico / apache2_BackdoorModLinks
A backdoor module for Apache2
☆198Updated 5 years ago
Alternatives and similar repositories for apache2_BackdoorMod
Users that are interested in apache2_BackdoorMod are comparing it to the libraries listed below
Sorting:
- a patched sshd for red team activities☆82Updated 4 years ago
- Steal privileged token to obtain SYSTEM shell☆251Updated 5 years ago
- A Simple Backdoor For Apache HTTP Server☆157Updated last year
- NTDS.dit offline dumper with non-elevated☆219Updated 7 years ago
- SimpleShellcodeInjector receives as an argument a shellcode in hex and executes it. It DOES NOT inject the shellcode in a third party ap…☆257Updated 4 years ago
- weaponized tool for CVE-2020-17144☆161Updated 4 years ago
- about CobaltStrike☆151Updated last year
- ProxyLogon Pre-Auth SSRF To Arbitrary File Write☆124Updated last year
- Programmatically create an administrative user under Windows☆183Updated 8 years ago
- Use to check the valid account of the Remote Desktop Protocol(Support plaintext and ntlmhash)☆165Updated 5 years ago
- Resources About Cobalt Strike. 100+ Tools And 200+ Posts.☆256Updated 5 years ago
- 修改的SweetPotato,使之可以用于CobaltStrike v4.0☆246Updated 5 years ago
- shecodject is a autoscript for shellcode injection by Python3 programing☆126Updated 5 years ago
- Exploit and detect tools for CVE-2020-0688☆356Updated 5 years ago
- 破解CS4.0☆163Updated 5 years ago
- CVE-2019-1040 with Exchange☆254Updated 4 years ago
- Use python to perform Kerberos pre-auth bruteforcing☆203Updated 2 years ago
- Use to build an anonymous SMB file server.☆230Updated 4 years ago
- Exchange2010 authorized RCE☆156Updated 4 years ago
- powershell codes of my blog.☆102Updated 5 years ago
- ☆187Updated 4 years ago
- WINDOWS TELEMETRY权限维持☆258Updated 5 years ago
- Domain Borrowing PoC☆214Updated 4 years ago
- backdoor☆255Updated 2 months ago
- CVE-2020–14882、CVE-2020–14883☆289Updated 4 years ago
- Proof of Concept Exploit for vCenter CVE-2021-21972☆264Updated 4 years ago
- bypass uac☆143Updated 7 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆189Updated 3 years ago
- Kerberos Exploitation Kit☆153Updated 10 years ago
- Security Support Provider Interface☆47Updated 5 years ago