Stealthy data exfiltration via IPv6 covert channel
☆103Jul 26, 2019Updated 6 years ago
Alternatives and similar repositories for IPv6teal
Users that are interested in IPv6teal are comparing it to the libraries listed below
Sorting:
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- Manticore Adversary Emulation Cli☆47Aug 4, 2020Updated 5 years ago
- Jira Information Gatherer☆29Dec 3, 2017Updated 8 years ago
- Exfiltrate data over screen interfaces☆58Nov 13, 2017Updated 8 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- QuickSQL is a simple MSSQL query tool that allows you to connect to MSSQL databases and does not require administrative level rights to u…☆103Apr 17, 2020Updated 5 years ago
- ☆82Dec 29, 2020Updated 5 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Basic C# Project that will take an MSBuild payload and run it with MSBuild via ClickOnce.☆93Oct 24, 2020Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Feb 23, 2024Updated 2 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- Digital Preservation Software (National Archives of Australia)☆38Jul 7, 2011Updated 14 years ago
- adding a backdooruser using win32api☆80Sep 3, 2020Updated 5 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 6 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Aug 11, 2021Updated 4 years ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- vulnerable single sign on☆150Aug 1, 2024Updated last year
- Crystal Anti-Exploit Protection 2012☆37May 31, 2020Updated 5 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- Is this IP a C2 server?☆28Apr 21, 2020Updated 5 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 6 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆109Oct 10, 2020Updated 5 years ago
- Some .ps1 scripts for pentesting☆140Jan 6, 2026Updated last month
- Python3 tool to perform password spraying using RDP☆668Aug 17, 2023Updated 2 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- ☆21Jun 3, 2021Updated 4 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆18May 17, 2020Updated 5 years ago
- How to spoof the command line when spawning a new process from C#.☆110Dec 28, 2021Updated 4 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Jun 26, 2020Updated 5 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Dec 8, 2022Updated 3 years ago