cheetz / ceylogger
Basic c-keylogger
☆24Updated 6 years ago
Related projects: ⓘ
- Custom THP Dropper☆27Updated 6 years ago
- ☆58Updated this week
- CVE-2020-0688 - Exchange☆67Updated 4 years ago
- Aggressor Script to launch IE driveby for CVE-2018-4878☆87Updated 6 years ago
- CVE-2020–14882 by Jang☆29Updated 3 years ago
- ☆67Updated this week
- ☆21Updated 5 years ago
- Citrix ADC Remote Code Execution☆84Updated 4 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆125Updated 2 years ago
- Use to perform Microsoft exchange account brute-force.☆73Updated 3 years ago
- Weblogic Unrestricted File Upload☆52Updated 5 years ago
- The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813☆67Updated 4 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Updated 6 years ago
- sploit☆67Updated 4 years ago
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆142Updated 4 years ago
- Directory transversal to remote code execution☆69Updated 4 years ago
- cve-2019-0604 SharePoint RCE exploit☆101Updated 4 years ago
- A weaponized version of CVE-2018-9206☆62Updated 5 years ago
- Apache Solr DataImport Handler RCE☆88Updated 5 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 6 years ago
- Learn from Casey Smith@subTee☆28Updated 3 years ago
- Use powershell to test Office-based persistence methods☆76Updated 3 years ago
- a collection of webshell☆44Updated 6 years ago
- ☆43Updated this week
- Use Waitfor.exe to maintain persistence☆55Updated 3 years ago
- ☆63Updated 5 years ago
- Cobalt Strike Aggressor Scripts☆29Updated 7 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Updated 5 years ago
- Learn how to get a reverse shell from JIRA application server☆24Updated 5 years ago
- ☆30Updated 5 years ago