ctxis / beemka
Basic Electron Exploitation
☆203Updated 5 years ago
Alternatives and similar repositories for beemka:
Users that are interested in beemka are comparing it to the libraries listed below
- Minimal code to connect to a CEF debugger.☆201Updated 4 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- JIRA Secure Attachment Looter☆69Updated 4 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Updated last year
- A DNS connectback shell executed by strings in payloads.txt☆103Updated last year
- Probe a rendering engine for vulnerabilities and other features☆367Updated 3 years ago
- DNS Rebinding Exploitation Framework☆488Updated 3 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 5 years ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆261Updated last year
- A repo full of example gscripts☆99Updated 5 years ago
- The Guppy Proxy (GUI Pappy)☆143Updated 5 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆368Updated last year
- A simple embedded Linux backdoor.☆196Updated 4 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago
- A framework for stealthy domain reconnaissance☆299Updated 3 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆385Updated 6 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆145Updated 5 years ago
- CMS/LMS/Library etc Versions Fingerprinter☆257Updated 3 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- A collection of useful Serverless functions I use when pentesting☆382Updated 2 years ago
- Encrypted exploit delivery for the masses☆263Updated 5 years ago
- A Chrome extension static analysis tool to help aide in security reviews.☆152Updated last year
- ncurses-grep: interactively navigate grep-like results☆32Updated 11 months ago
- GTRS - Google Translator Reverse Shell☆615Updated 4 months ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆469Updated 2 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- A malware analysis and classification tool.☆191Updated 3 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆201Updated last year
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- Burp Suite extension to perform Kerberos authentication☆104Updated 8 months ago