ctxis / beemkaLinks
Basic Electron Exploitation
☆208Updated 6 years ago
Alternatives and similar repositories for beemka
Users that are interested in beemka are comparing it to the libraries listed below
Sorting:
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 4 years ago
- CLI tool for PKCS7 padding oracle attacks☆142Updated 4 years ago
- JIRA Secure Attachment Looter☆71Updated 5 years ago
- ☆166Updated 6 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆139Updated last year
- A DNS connectback shell executed by strings in payloads.txt☆102Updated 2 years ago
- A simple embedded Linux backdoor.☆199Updated 5 years ago
- Minimal code to connect to a CEF debugger.☆211Updated 5 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- Burp with Friends☆103Updated 3 years ago
- DNS Rebinding Exploitation Framework☆495Updated 4 years ago
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- Fast browser-based network discovery module☆115Updated 4 years ago
- Linux privilege escalation via LXD☆141Updated 5 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆211Updated 5 years ago
- Mallet is an intercepting proxy for arbitrary protocols☆289Updated 9 months ago
- The Guppy Proxy (GUI Pappy)☆142Updated 6 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
- A cross-platform one-liner to steal a user's cookies from Chrome <- cool☆87Updated 7 years ago
- This small utility retrieves from the CommonCrawl data set unique subdomains for a given domain name.☆179Updated last month
- Linux Local Privesc Helper and Agent☆167Updated 6 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Updated 3 years ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆103Updated 6 years ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆128Updated 5 years ago
- ProxyDock is a Dockerfile and Bash script that converts your OpenVPN files into local proxies.☆136Updated 5 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 4 years ago
- ncurses-grep: interactively navigate grep-like results☆32Updated last year
- Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious S…☆241Updated 2 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆297Updated 6 years ago