byinarie / qu1ckdr0p2Links
Quicky serve files over http or https using flask.
☆35Updated 7 months ago
Alternatives and similar repositories for qu1ckdr0p2
Users that are interested in qu1ckdr0p2 are comparing it to the libraries listed below
Sorting:
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- Repo for all my exploits/PoCs☆52Updated 4 months ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- Cobalt Strike BOFS☆16Updated last year
- MacroExploit use in excel sheet☆20Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- RegStrike is a .reg payload generator☆58Updated last year
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆50Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆115Updated last year
- ☆25Updated 2 years ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated last year
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- ☆58Updated 9 months ago
- CVE-2023-20198 & 0Day Implant Scanner☆31Updated 4 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 7 months ago
- Duplicate not owned Token from Running Process☆72Updated 2 years ago
- exfiltration/infiltration toolkit☆24Updated last year
- C++ Code to perform a MiniDump of lsass.exe☆34Updated 2 years ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 4 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆64Updated 9 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆38Updated last year
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- POC for DLL Proxying / Hijacking☆62Updated 3 months ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated last year
- Penetration Testing & Red Team tools & scripts☆12Updated last year
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago
- Tomcat backdoor based on CS blog☆27Updated 2 years ago
- ☆54Updated 8 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year