brosck / PingoorLinks
γπͺγLinux Backdoor based on ICMP protocol
β63Updated 11 months ago
Alternatives and similar repositories for Pingoor
Users that are interested in Pingoor are comparing it to the libraries listed below
Sorting:
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ26Updated 3 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client aβ¦β75Updated 2 years ago
- π WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.β27Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.β33Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ49Updated 2 years ago
- β28Updated 2 years ago
- Exploits targeting vBulletin.β75Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")β57Updated last year
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845β62Updated 9 months ago
- β44Updated 2 years ago
- RegStrike is a .reg payload generatorβ58Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Pythonβ25Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strikeβ53Updated 3 years ago
- quick and dirty proof-of-concept to hide shells in imagesβ52Updated last year
- C++ Code to perform a MiniDump of lsass.exeβ35Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.β48Updated 2 years ago
- Personal notes from Red teamer for Blue/Red/Purple.β56Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.β50Updated 2 years ago
- A repository with my code snippets for research/education purposes.β52Updated 2 years ago
- Duplicate not owned Token from Running Processβ73Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).β61Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious processβ71Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero anβ¦β29Updated 2 years ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtectβ29Updated last year
- β27Updated 2 years ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secureβ30Updated last year
- DLink DIR-846 Authenticated Remote Code Executionβ18Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the serverβ46Updated 10 months ago
- Repo for all my exploits/PoCsβ53Updated 6 months ago
- A C2 framework built for my bachelors thesisβ56Updated last year