brosck / PingoorLinks
γπͺγLinux Backdoor based on ICMP protocol
β63Updated last year
Alternatives and similar repositories for Pingoor
Users that are interested in Pingoor are comparing it to the libraries listed below
Sorting:
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client aβ¦β75Updated 2 years ago
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ26Updated 3 years ago
- RegStrike is a .reg payload generatorβ58Updated 2 years ago
- π WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.β27Updated 2 years ago
- β29Updated 2 years ago
- Personal notes from Red teamer for Blue/Red/Purple.β57Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ50Updated 2 years ago
- Cobalt Strike BOFSβ16Updated 2 years ago
- Duplicate not owned Token from Running Processβ74Updated 2 years ago
- Quicky serve files over http or https using flask.β35Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.β33Updated 2 years ago
- MacroExploit use in excel sheetβ20Updated 2 years ago
- Exploits targeting vBulletin.β75Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strikeβ52Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.β48Updated 3 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the serverβ47Updated last year
- DLink DIR-846 Authenticated Remote Code Executionβ18Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in imagesβ51Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.β51Updated 2 years ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845β62Updated 11 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).β60Updated last year
- A C2 framework built for my bachelors thesisβ57Updated 3 weeks ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)β23Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious processβ75Updated last year
- β46Updated 3 months ago
- Repo for all my exploits/PoCsβ51Updated 9 months ago
- Bruteforces Fortinet SSL VPNsβ57Updated 2 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processesβ116Updated last year
- A repository with my code snippets for research/education purposes.β52Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Pythonβ25Updated 2 years ago