ctxis / beemkaLinks
Basic Electron Exploitation
☆209Updated 6 years ago
Alternatives and similar repositories for beemka
Users that are interested in beemka are comparing it to the libraries listed below
Sorting:
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 4 years ago
- A DNS connectback shell executed by strings in payloads.txt☆102Updated 2 years ago
- JIRA Secure Attachment Looter☆70Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- ☆166Updated 6 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Linux privilege escalation via LXD☆139Updated 5 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆136Updated 11 months ago
- CLI tool for PKCS7 padding oracle attacks☆140Updated 4 years ago
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- Minimal code to connect to a CEF debugger.☆208Updated 5 years ago
- DNS Rebinding Exploitation Framework☆492Updated 4 years ago
- ☆147Updated 6 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆175Updated 7 years ago
- Mallet is an intercepting proxy for arbitrary protocols☆283Updated 5 months ago
- This small utility retrieves from the CommonCrawl data set unique subdomains for a given domain name.☆162Updated 3 years ago
- The Guppy Proxy (GUI Pappy)☆143Updated 6 years ago
- Discover target social media profiles☆81Updated 3 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- ☆143Updated 6 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- Red Team Resources☆60Updated 6 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆397Updated 5 years ago
- Slides and Code for the BHUSA 2019 talk: Flying a False Flag☆238Updated 5 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆96Updated last year
- Encrypted exploit delivery for the masses☆268Updated 6 years ago
- Fast browser-based network discovery module☆114Updated 4 years ago