b1ack0wl / linux_mint_poc
☆52Updated 5 years ago
Alternatives and similar repositories for linux_mint_poc:
Users that are interested in linux_mint_poc are comparing it to the libraries listed below
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- ☆13Updated 5 years ago
- ☆36Updated 6 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Full TTY reverse shell over SSH☆58Updated 4 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated last year
- My fuzzing workshop from PHDays9☆27Updated 5 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Updated 5 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- ☆24Updated 4 years ago
- ☆96Updated 3 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆35Updated 6 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 7 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 6 years ago
- Extension adds a new tab in Burp Suite called Extractor☆43Updated 5 years ago
- Red Team Resources☆59Updated 6 years ago
- Proof of calc for CVE-2019-6453☆49Updated last year
- ☆38Updated 4 years ago
- ☆44Updated 4 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- ☆46Updated 5 years ago
- Windows Stagers to circumvent restrictive network environments☆64Updated 4 months ago
- ☆20Updated 5 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago