byinarie / qu1ckdr0p2Links
Quicky serve files over http or https using flask.
☆35Updated 11 months ago
Alternatives and similar repositories for qu1ckdr0p2
Users that are interested in qu1ckdr0p2 are comparing it to the libraries listed below
Sorting:
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago
- Repo for all my exploits/PoCs☆53Updated 8 months ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆44Updated 3 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52Updated last year
- Duplicate not owned Token from Running Process☆74Updated 2 years ago
- Cobalt Strike BOFS☆16Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆22Updated last year
- POC for DLL Proxying / Hijacking☆62Updated 7 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated last year
- Microsoft Exchange password spray tool with proxy support.☆39Updated 4 years ago
- RCE PoC for Empire C2 framework <5.9.3☆27Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆37Updated 2 years ago
- Exploits targeting vBulletin.☆75Updated 2 years ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated 2 years ago
- Penetration Testing & Red Team tools & scripts☆12Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- ☆27Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆59Updated 11 months ago
- Cloud Exploit Framework☆114Updated 3 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- ☆59Updated last year
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated 2 months ago