A PoC for a malicious Confluence plugin.
☆16Aug 15, 2024Updated last year
Alternatives and similar repositories for malfluence
Users that are interested in malfluence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆17Aug 7, 2024Updated last year
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- My dotfiles for Linux boxes☆57Apr 3, 2026Updated last week
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- Reconnaisance Tool☆12Jun 4, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Exploit for the CVE-2024-5806☆45Jun 24, 2024Updated last year
- ☆10Aug 7, 2019Updated 6 years ago
- RecoveryGPT - Revive your ChatGPT conversations with elegance and full privacy!☆15Nov 26, 2023Updated 2 years ago
- Impacket with --remove-mic-partial☆36Jan 8, 2026Updated 3 months ago
- ☆18Aug 8, 2024Updated last year
- ☆26Aug 11, 2025Updated 8 months ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- yet another pButtons extractor☆11Jan 6, 2026Updated 3 months ago
- ☆21Apr 30, 2025Updated 11 months ago
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆85Updated this week
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆31Jan 18, 2025Updated last year
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- PersonaAI is a versatile tool designed to perform psychological profiling based on a person's Facebook ID.☆12Aug 21, 2024Updated last year
- A super simple cloudflare worker that returns the location of the user based on the IP address.☆18Sep 29, 2025Updated 6 months ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- PDF dropper Red Team Scenairos☆231Jul 31, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Jun 17, 2024Updated last year
- Pseudo-shell for RCE scenarios: tunnels commands via /tmp sockets to a local daemon, keeps context, no bind or reverse shell needed.☆45Jun 12, 2025Updated 10 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆79Jun 11, 2024Updated last year
- Source code of smaller projects.☆28Feb 1, 2026Updated 2 months ago
- ☆27May 1, 2025Updated 11 months ago
- ☆31May 16, 2024Updated last year
- Provides a method unix_time which returns elapsed time since UNIX EPOCH. The returned time can be faked in each thread separately.☆12May 19, 2021Updated 4 years ago
- Bring Your Own FIDO2 Extensions!☆16May 13, 2025Updated 11 months ago
- A Sensor Streamer for Android Wear OS☆15Feb 9, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 9 months ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- ☆16Dec 7, 2025Updated 4 months ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆13Aug 8, 2023Updated 2 years ago
- An Apple Silicon hooking library written in C☆13Sep 19, 2021Updated 4 years ago
- A simple macOS debugger detection trick☆19Apr 7, 2025Updated last year