ca10x / RSA-reverse-shellLinks
Python implementation of RSA reverse shell.
☆11Updated 9 years ago
Alternatives and similar repositories for RSA-reverse-shell
Users that are interested in RSA-reverse-shell are comparing it to the libraries listed below
Sorting:
- CVE-2018-6546-Exploit☆41Updated 7 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Updated 7 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Updated 5 years ago
- CVE-2019-12949☆26Updated 6 years ago
- Windows log and threat hunting with powershell☆16Updated 5 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Updated 3 years ago
- Self defense post module for metasploit☆17Updated 6 years ago
- 获取系统KB补丁对于的MS号☆24Updated 6 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Updated 6 years ago
- ☆17Updated 7 years ago
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Updated 6 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Updated 6 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆15Updated 6 years ago
- ☆24Updated 5 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Updated 7 years ago
- Linux AV tests☆13Updated 6 years ago
- CVE-2019-18890 POC (Proof of Concept)☆10Updated 6 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Updated 6 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Updated 2 years ago
- ☆21Updated 6 years ago
- New Found 0-days!☆36Updated 6 years ago
- 010 Editor template for ACE archive format & CVE-2018-2025[0-3]☆26Updated 6 years ago
- interesting analysis☆16Updated 7 years ago
- CVE-2018-19537☆20Updated 7 years ago
- Win32k Elevation of Privilege Poc☆24Updated 6 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Updated 7 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆31Updated 10 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Updated 5 years ago
- (Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 – Unauthenticated Arbitrary File Upload☆17Updated 6 years ago