ctxis / beemkaLinks
Basic Electron Exploitation
☆211Updated 5 years ago
Alternatives and similar repositories for beemka
Users that are interested in beemka are comparing it to the libraries listed below
Sorting:
- DNS Rebinding Exploitation Framework☆489Updated 4 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- ProxyDock is a Dockerfile and Bash script that converts your OpenVPN files into local proxies.☆137Updated 5 years ago
- Minimal code to connect to a CEF debugger.☆207Updated 4 years ago
- A framework for stealthy domain reconnaissance☆303Updated 3 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- Encrypted exploit delivery for the masses☆267Updated 5 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆146Updated 5 years ago
- Linux privilege escalation via LXD☆133Updated 5 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆243Updated 2 years ago
- A DNS connectback shell executed by strings in payloads.txt☆105Updated last year
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- JIRA Secure Attachment Looter☆70Updated 4 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Updated last year
- A repo full of example gscripts☆100Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- A collection of useful Serverless functions I use when pentesting☆386Updated 2 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 6 years ago
- A script that automates generation of OpenSSL reverse shells☆301Updated 4 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆386Updated 6 years ago
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆561Updated 2 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆394Updated 5 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆161Updated 5 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated 11 months ago
- A powerful target reconnaissance framework powered by graph theory.☆420Updated 2 years ago
- This small utility retrieves from the CommonCrawl data set unique subdomains for a given domain name.☆160Updated 2 years ago
- locate and attack Lync/Skype for Business☆338Updated 8 months ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Another web fuzzer written in NodeJS☆58Updated 6 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆189Updated 5 years ago