blechschmidt / pallium
Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining
☆14Updated 2 months ago
Alternatives and similar repositories for pallium:
Users that are interested in pallium are comparing it to the libraries listed below
- A ptrace-based TLS 1.2 master secret extractor for reverse engineering (PoC)☆26Updated last year
- NVD semiupdated database to be used with CVEScannerV2☆14Updated 2 weeks ago
- A C# Tool to gather information about email breaches☆14Updated last year
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆29Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- Create an AMI with CobaltStrike and related tools.☆9Updated this week
- ShellC0de Generator☆11Updated 3 years ago
- Recon (Whois)☆15Updated last year
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated last year
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆13Updated 11 months ago
- service location protocol amplified denial of service attack verification tool☆16Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Burpsuite Plugin to bypass strict RePlay protection☆12Updated 3 years ago
- Burp Suite Extension - Trigger actions and reshape HTTP request and response traffic using configurable rules☆16Updated 4 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- 🐍 Python Exploit for CVE-2022-23935☆13Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- ☆10Updated 2 years ago
- Insecure Android Application for testing Biometric bypasses☆12Updated 2 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- web based c2 🏴☠️☆13Updated 7 months ago
- Cross platform system wide proxy server & TLS Interception library for Python☆22Updated last year
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆9Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆38Updated 2 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆66Updated 5 years ago
- AWS Cloud Landscape Search Engine☆20Updated last year
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆18Updated 11 months ago