audibleblink / bothanLinks
Is this IP a C2 server?
☆28Updated 5 years ago
Alternatives and similar repositories for bothan
Users that are interested in bothan are comparing it to the libraries listed below
Sorting:
- Jira Information Gatherer☆29Updated 7 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- Leak windows system info through a docx file☆12Updated 5 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago
- Some talks about security☆13Updated 4 years ago
- CVE-2020-12828 PoC and Analysis.☆29Updated 5 years ago
- CVE2020-0796 SMBv3 RCE☆61Updated 5 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Updated 6 years ago
- ☆19Updated 5 years ago
- initial commit☆44Updated 11 months ago
- Webshell for Razor Syntax (C#)☆19Updated 8 years ago
- ☆50Updated 5 years ago
- ☆13Updated 4 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- (Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 – Unauthenticated Arbitrary File Upload☆17Updated 6 years ago
- Exploits, Exploits, Exploits and more Exploits!☆33Updated 4 years ago
- Self defense post module for metasploit☆17Updated 6 years ago
- Apache Module Backdoor (PoC)☆48Updated 6 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 6 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Updated 3 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Updated 6 years ago
- Ex-pv8's☆64Updated 6 years ago
- PoC CVE-2020-6308☆36Updated 4 years ago
- Automate Network sessions enumeration of connected users in the domain, to facilitate AD Reconnaissance for Adversary simulation & Red Te…☆20Updated 4 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 5 years ago
- eternalrelayx☆36Updated 6 years ago
- Windows log and threat hunting with powershell☆16Updated 4 years ago
- A simple scanner to find and brute force tomcat manager logins☆28Updated 5 years ago
- a parser + crawler for .DS_Store files exposed publically☆54Updated 2 years ago
- Domain fronting using Google app engine☆52Updated 7 years ago