ctxis / beemkaLinks
Basic Electron Exploitation
☆212Updated 5 years ago
Alternatives and similar repositories for beemka
Users that are interested in beemka are comparing it to the libraries listed below
Sorting:
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- A DNS connectback shell executed by strings in payloads.txt☆104Updated last year
- JIRA Secure Attachment Looter☆70Updated 5 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆135Updated 9 months ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- CLI tool for PKCS7 padding oracle attacks☆139Updated 4 years ago
- ☆166Updated 6 years ago
- This small utility retrieves from the CommonCrawl data set unique subdomains for a given domain name.☆161Updated 3 years ago
- Burp with Friends☆103Updated 2 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- Minimal code to connect to a CEF debugger.☆208Updated 5 years ago
- DNS Rebinding Exploitation Framework☆491Updated 4 years ago
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- Loot email addresses from commit entries☆56Updated 2 years ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆251Updated last month
- ☆147Updated 5 years ago
- A Chrome extension static analysis tool to help aide in security reviews.☆157Updated last year
- Code Review Audit Script Scanner☆140Updated 3 months ago
- A simple tool to convert the IP to a DWORD IP☆139Updated 3 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
- Encrypted exploit delivery for the masses☆268Updated 5 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆96Updated 11 months ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆242Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- vulnerable single sign on☆148Updated last year
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆71Updated 5 years ago
- DNS File EXfiltration☆46Updated last year
- Burp Suite extension to perform Kerberos authentication☆104Updated last year