brosck / PingoorLinks
γπͺγLinux Backdoor based on ICMP protocol
β63Updated last year
Alternatives and similar repositories for Pingoor
Users that are interested in Pingoor are comparing it to the libraries listed below
Sorting:
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client aβ¦β75Updated 2 years ago
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ26Updated 3 years ago
- β29Updated 2 years ago
- π WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.β27Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ50Updated 2 years ago
- Personal notes from Red teamer for Blue/Red/Purple.β57Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.β48Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strikeβ52Updated 3 years ago
- Exploits targeting vBulletin.β75Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.β33Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in imagesβ51Updated last year
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text verβ¦β39Updated 3 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")β57Updated 2 years ago
- β44Updated 3 years ago
- Quicky serve files over http or https using flask.β35Updated last year
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secureβ30Updated last year
- RegStrike is a .reg payload generatorβ58Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).β60Updated last year
- MacroExploit use in excel sheetβ20Updated 2 years ago
- C++ Code to perform a MiniDump of lsass.exeβ36Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 3 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the β¦β73Updated 2 years ago
- DLink DIR-846 Authenticated Remote Code Executionβ18Updated 2 years ago
- CVE-2023-20198 & 0Day Implant Scannerβ33Updated last month
- Proof of Concept for CVE-2023-23397 in Pythonβ25Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the serverβ47Updated last year
- Duplicate not owned Token from Running Processβ74Updated 2 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β112Updated 2 years ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845β62Updated 11 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero anβ¦β31Updated 2 years ago