ctxis / beemkaLinks
Basic Electron Exploitation
☆207Updated 6 years ago
Alternatives and similar repositories for beemka
Users that are interested in beemka are comparing it to the libraries listed below
Sorting:
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 4 years ago
- ☆166Updated 6 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆136Updated last year
- JIRA Secure Attachment Looter☆69Updated 5 years ago
- CLI tool for PKCS7 padding oracle attacks☆140Updated 4 years ago
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- A Metasploit auto auxiliary script☆103Updated 3 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
- A DNS connectback shell executed by strings in payloads.txt☆102Updated 2 years ago
- Red Team Resources☆60Updated 6 years ago
- A simple embedded Linux backdoor.☆199Updated 5 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Burp with Friends☆103Updated 2 years ago
- Words list generator to crack security tokens☆110Updated 5 years ago
- This small utility retrieves from the CommonCrawl data set unique subdomains for a given domain name.☆162Updated 3 years ago
- Mallet is an intercepting proxy for arbitrary protocols☆283Updated 6 months ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- Discover target social media profiles☆81Updated 3 years ago
- ☆147Updated 6 years ago
- Loot email addresses from commit entries☆56Updated 3 years ago
- vulnerable single sign on☆148Updated last year
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆126Updated 5 years ago
- Minimal code to connect to a CEF debugger.☆209Updated 5 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆261Updated 2 years ago
- A Chrome extension static analysis tool to help aide in security reviews.☆157Updated 2 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago