ctxis / beemkaLinks
Basic Electron Exploitation
☆211Updated 5 years ago
Alternatives and similar repositories for beemka
Users that are interested in beemka are comparing it to the libraries listed below
Sorting:
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Updated 2 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- CLI tool for PKCS7 padding oracle attacks☆138Updated 4 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆135Updated 8 months ago
- Minimal code to connect to a CEF debugger.☆207Updated 5 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
- ☆166Updated 6 years ago
- Linux privilege escalation via LXD☆135Updated 5 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- The Guppy Proxy (GUI Pappy)☆143Updated 6 years ago
- JIRA Secure Attachment Looter☆70Updated 5 years ago
- DNS Rebinding Exploitation Framework☆489Updated 4 years ago
- Red Team Resources☆60Updated 6 years ago
- Encrypted exploit delivery for the masses☆267Updated 5 years ago
- A DNS connectback shell executed by strings in payloads.txt☆104Updated last year
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆96Updated 10 months ago
- Burp with Friends☆103Updated 2 years ago
- Mallet is an intercepting proxy for arbitrary protocols☆279Updated 2 months ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆204Updated 2 years ago
- This small utility retrieves from the CommonCrawl data set unique subdomains for a given domain name.☆161Updated 2 years ago
- Loot email addresses from commit entries☆56Updated 2 years ago
- a CLI for ephemeral penetration testing☆13Updated 5 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- macOS Client-Side Phishing lock screen payload☆128Updated 6 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆77Updated 5 years ago
- Python automation of Docker.sock abuse☆212Updated 2 years ago
- ☆143Updated 6 years ago