brosck / PingoorLinks
γπͺγLinux Backdoor based on ICMP protocol
β63Updated 11 months ago
Alternatives and similar repositories for Pingoor
Users that are interested in Pingoor are comparing it to the libraries listed below
Sorting:
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client aβ¦β75Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.β33Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ49Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Pythonβ25Updated 2 years ago
- Exploits targeting vBulletin.β75Updated 2 years ago
- RegStrike is a .reg payload generatorβ58Updated 2 years ago
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ26Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strikeβ52Updated 3 years ago
- DLink DIR-846 Authenticated Remote Code Executionβ18Updated 2 years ago
- β28Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.β48Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in imagesβ52Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).β61Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.β49Updated 2 years ago
- A C2 framework built for my bachelors thesisβ56Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious processβ72Updated last year
- C++ Code to perform a MiniDump of lsass.exeβ36Updated 2 years ago
- Duplicate not owned Token from Running Processβ72Updated 2 years ago
- Cobalt Strike BOFSβ16Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")β57Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processesβ115Updated last year
- β59Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β111Updated 2 years ago
- Quicky serve files over http or https using flask.β35Updated 9 months ago
- vulnlab.com reaper writeupβ27Updated 2 years ago
- POC for DLL Proxying / Hijackingβ62Updated 5 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the serverβ46Updated 9 months ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the β¦β73Updated 2 years ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploitβ48Updated 10 months ago
- Bruteforces Fortinet SSL VPNsβ57Updated 2 years ago