alexanderbittner / steam-privesc
A privilege escalation exploit in the Steam Client
☆13Updated 5 years ago
Alternatives and similar repositories for steam-privesc:
Users that are interested in steam-privesc are comparing it to the libraries listed below
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- ☆13Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 4 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆1Updated 3 years ago
- buffer overflow examples☆22Updated 7 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Updated 4 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Updated 4 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 6 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- Side Channel script☆25Updated 2 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 7 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Updated 9 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Cyb3rpin7a Tool is keylogger when we run python file on victim pc it's work like trojan and tack screenshot in ever 5 seconds from victim…☆10Updated 4 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- Expose local port of a remote victim over Internet☆11Updated 5 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago