ctxis / beemka
Basic Electron Exploitation
☆211Updated 5 years ago
Alternatives and similar repositories for beemka:
Users that are interested in beemka are comparing it to the libraries listed below
- A repo full of example gscripts☆100Updated 5 years ago
- DNS Rebinding Exploitation Framework☆488Updated 4 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆127Updated last year
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 6 years ago
- locate and attack Lync/Skype for Business☆336Updated 7 months ago
- A framework for stealthy domain reconnaissance☆303Updated 3 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆202Updated 2 years ago
- Linux privilege escalation via LXD☆133Updated 5 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated 10 months ago
- Minimal code to connect to a CEF debugger.☆206Updated 4 years ago
- Probe a rendering engine for vulnerabilities and other features☆367Updated 3 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆146Updated 5 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Small scripts that make life better☆296Updated 3 months ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- Encrypted exploit delivery for the masses☆267Updated 5 years ago
- The request.bin of DNS request☆235Updated 6 years ago
- This small utility retrieves from the CommonCrawl data set unique subdomains for a given domain name.☆159Updated 2 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆178Updated 2 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- GTRS - Google Translator Reverse Shell☆615Updated 7 months ago
- A DNS connectback shell executed by strings in payloads.txt☆105Updated last year
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆77Updated 5 years ago
- Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!☆377Updated last month
- macOS Offensive Tools☆266Updated last year
- ☆167Updated 6 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆380Updated 4 years ago
- PrintDemon is a PoC for a series of issues in the Windows Print Spooler service, as well as potetial misuses of the functionality.☆202Updated 4 years ago