ctxis / beemkaLinks
Basic Electron Exploitation
☆207Updated 6 years ago
Alternatives and similar repositories for beemka
Users that are interested in beemka are comparing it to the libraries listed below
Sorting:
- A simple embedded Linux backdoor.☆199Updated 5 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 4 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Updated 2 years ago
- Encrypted exploit delivery for the masses☆269Updated 6 years ago
- A DNS connectback shell executed by strings in payloads.txt☆102Updated 2 years ago
- macOS Client-Side Phishing lock screen payload☆129Updated 6 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆136Updated last year
- ☆166Updated 6 years ago
- Mallet is an intercepting proxy for arbitrary protocols☆286Updated 7 months ago
- Minimal code to connect to a CEF debugger.☆209Updated 5 years ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆102Updated 6 years ago
- CLI tool for PKCS7 padding oracle attacks☆141Updated 4 years ago
- Loot email addresses from commit entries☆56Updated 3 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- async mass DNS resolver☆82Updated last year
- Linux privilege escalation via LXD☆140Updated 5 years ago
- Red Team Resources☆60Updated 6 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- JIRA Secure Attachment Looter☆70Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Burp Suite extension to perform Kerberos authentication☆105Updated last year
- Orc is a post-exploitation framework for Linux written in Bash☆398Updated 6 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- A Metasploit auto auxiliary script☆103Updated 3 years ago
- Tool to communicate with RPC services and check misconfigurations on NFS shares☆64Updated 6 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆176Updated 7 years ago