ctxis / beemka
Basic Electron Exploitation
☆203Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for beemka
- DNS Rebinding Exploitation Framework☆482Updated 3 years ago
- Probe a rendering engine for vulnerabilities and other features☆366Updated 3 years ago
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆627Updated 2 years ago
- Minimal code to connect to a CEF debugger.☆197Updated 4 years ago
- A DNS connectback shell executed by strings in payloads.txt☆101Updated last year
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆553Updated last year
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆485Updated 3 years ago
- A collection of useful Serverless functions I use when pentesting☆381Updated last year
- This small utility retrieves from the CommonCrawl data set unique subdomains for a given domain name.☆156Updated 2 years ago
- A simple embedded Linux backdoor.☆194Updated 4 years ago
- CLI tool for PKCS7 padding oracle attacks☆134Updated 3 years ago
- Encrypted exploit delivery for the masses☆259Updated 5 years ago
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆196Updated 5 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆390Updated 5 years ago
- rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments☆242Updated 5 years ago
- A powerful target reconnaissance framework powered by graph theory.☆421Updated 2 years ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆259Updated last year
- locate and attack Lync/Skype for Business☆334Updated last month
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Updated last year
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆280Updated 4 months ago
- Issues to consider when planning a red team exercise.☆611Updated 7 years ago
- A framework for stealthy domain reconnaissance☆293Updated 3 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 5 years ago
- A script that automates generation of OpenSSL reverse shells☆300Updated 4 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆92Updated 2 months ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆395Updated 4 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆288Updated 5 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆610Updated last year
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆619Updated 4 years ago