ctxis / beemkaLinks
Basic Electron Exploitation
☆208Updated 6 years ago
Alternatives and similar repositories for beemka
Users that are interested in beemka are comparing it to the libraries listed below
Sorting:
- A DNS connectback shell executed by strings in payloads.txt☆102Updated 2 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 4 years ago
- JIRA Secure Attachment Looter☆70Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆137Updated last year
- CLI tool for PKCS7 padding oracle attacks☆142Updated 4 years ago
- ☆166Updated 6 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 5 years ago
- A simple embedded Linux backdoor.☆199Updated 5 years ago
- BlueKeep scanner supporting NLA☆165Updated 6 years ago
- Burp with Friends☆103Updated 2 years ago
- Linux privilege escalation via LXD☆141Updated 5 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- Mallet is an intercepting proxy for arbitrary protocols☆288Updated 8 months ago
- ncurses-grep: interactively navigate grep-like results☆32Updated last year
- DNS Rebinding Exploitation Framework☆494Updated 4 years ago
- Minimal code to connect to a CEF debugger.☆211Updated 5 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Updated 3 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆177Updated 7 years ago
- Discover target social media profiles☆81Updated 3 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 7 years ago
- Burp Suite extension to perform Kerberos authentication☆106Updated last year
- This small utility retrieves from the CommonCrawl data set unique subdomains for a given domain name.☆164Updated this week
- macOS Client-Side Phishing lock screen payload☆129Updated 6 years ago
- async mass DNS resolver☆83Updated last year
- DNS File EXfiltration☆45Updated last year
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆102Updated 6 years ago
- DupeKeyInjector☆135Updated 3 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago