blackhuntop / Ghost-Cve
GitHub CVE Repository Hunt
☆18Updated 6 months ago
Alternatives and similar repositories for Ghost-Cve:
Users that are interested in Ghost-Cve are comparing it to the libraries listed below
- Our Tips&Tricks☆41Updated last week
- Useful collection of scapy-scripts and more☆26Updated 7 months ago
- ☆26Updated last year
- MacOS SX (Stealer) Free 🕵️♂️💻(Passwords, cookies, Google Auth, History) Grabber 📤(uploadcare API for exfiltration)☆23Updated last week
- POC for CVE-2024-3183 (FreeIPA Rosting)☆17Updated 5 months ago
- VLAN ID Parser☆6Updated 8 months ago
- PowerShell script to generate ShellCode in various formats☆41Updated 4 months ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با ها نت لرن☆30Updated 4 months ago
- Auto exploitation tool for CVE-2024-24401.☆30Updated 4 months ago
- aiohttp LFI (CVE-2024-23334)☆24Updated 10 months ago
- exfiltration/infiltration toolkit☆43Updated 2 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆19Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆26Updated 11 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 6 months ago
- Repo for all my exploits/PoCs☆32Updated 4 months ago
- Situational Awareness script to identify how and where to run implants☆43Updated last month
- exfiltration/infiltration toolkit☆23Updated last year
- hiding in plain sight: part 2☆44Updated 6 months ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- Fast Path Traversal exploitation tool☆21Updated 9 months ago
- A small executable to trick a user to authenticate using code matching MFA☆68Updated last year
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆14Updated 10 months ago
- A script to automate keystrokes through a graphical desktop program.☆33Updated this week
- LiteSpeed Cache Privilege Escalation PoC☆16Updated 5 months ago
- ☆34Updated last year
- LNK-Dropper Builder☆18Updated 4 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated 10 months ago
- ECC Public Key Cryptography☆36Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆44Updated last year