cameron-gagnon / ssh_pass_logging
SSH password logging via PAM
☆28Updated 4 years ago
Related projects: ⓘ
- ☆31Updated 8 years ago
- ☆20Updated this week
- ☆22Updated this week
- Apache Module Backdoor (PoC)☆47Updated 5 years ago
- An interactive webshell and HTTP tunnel for TCP connections using chunked transfer encoding☆48Updated 5 years ago
- printer job language tool, for accessing the filesystem, checking for data like documents, faxes or similar☆9Updated 9 years ago
- ☆39Updated this week
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Updated 5 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆14Updated 5 years ago
- PoC materials to exploit CVE-2019-15846☆30Updated 4 years ago
- Slide deck for DefCon Beijing☆39Updated 6 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆53Updated 4 years ago
- Security Research☆36Updated 2 years ago
- Remote Desktop Protocol in Twisted Python☆26Updated 6 years ago
- GNU/Linux version of the https://github.com/inquisb/icmpsh slave☆22Updated 4 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆57Updated 4 years ago
- Proof of Concept for a VSCode Python Extension Code Execution Vulnerability☆16Updated 4 years ago
- Use to browse the share file by eas(Exchange Server ActiveSync)☆43Updated 4 years ago
- A Burp Extender plugin, that will take deserialized AMF objects and encode them in XML using the Xtream library☆27Updated 9 years ago
- Vulnerability Research and Proof of Concept exploits for various targets☆34Updated last year
- ☆18Updated 4 years ago
- PoC for CVE-2020-11651☆6Updated 4 years ago
- This is a kernel module invoked reverse shell proof of concept.☆68Updated 4 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆41Updated 8 years ago
- Linux AV tests☆14Updated 5 years ago
- A simple script to decrypt stored passwords from Oracle WebLogic Server configuration files☆30Updated 8 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆42Updated 10 months ago
- a exec jsp shell, simply like weevely php C/S shell.☆14Updated 2 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆30Updated 9 years ago
- ☆18Updated 3 years ago