An implementation of NSA's ExplodingCan exploit in Python
☆269Jan 4, 2018Updated 8 years ago
Alternatives and similar repositories for explodingcan
Users that are interested in explodingcan are comparing it to the libraries listed below
Sorting:
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 8 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆260Mar 9, 2021Updated 4 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Dec 3, 2020Updated 5 years ago
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- iis6 exploit 2017 CVE-2017-7269☆92Feb 4, 2023Updated 3 years ago
- These are exploits created to avoid the use of Metasploit. While studying for OSCP in the Offsec labs, VHL, Vulnhub, etc, I tried to find…☆32Jul 31, 2025Updated 7 months ago
- A collection of curated Java Deserialization Exploits☆591May 16, 2021Updated 4 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆252Sep 27, 2023Updated 2 years ago
- Add UART and LCD 1602 to HACKRF.☆14Sep 1, 2015Updated 10 years ago
- Avoidz tool to bypass most A.V softwares☆139Sep 28, 2017Updated 8 years ago
- Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)☆593Jan 8, 2021Updated 5 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- Changes for Visual Studio 2013☆119Jun 22, 2015Updated 10 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,992Oct 10, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- offsec batteries included☆1,599Mar 11, 2024Updated last year
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)☆13Jul 30, 2021Updated 4 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆111Aug 21, 2018Updated 7 years ago
- Encode powershell payload into bat files☆155Feb 1, 2018Updated 8 years ago
- The documents☆56Nov 2, 2017Updated 8 years ago
- Deploy payloads to *Nix systems en masse☆108Apr 24, 2020Updated 5 years ago
- Exploit for Drupal 7 <= 7.57 CVE-2018-7600☆139Apr 26, 2018Updated 7 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Dec 27, 2022Updated 3 years ago
- Some scripts and exploits☆148Jul 9, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- A ton of helpful tools☆344Oct 8, 2021Updated 4 years ago
- Proof of concept for CVE-2019-0708☆1,186Dec 2, 2021Updated 4 years ago
- This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP …☆11Nov 3, 2020Updated 5 years ago
- A PowerShell script to download all files, messages and user profiles that a user has access to in slack.☆155Oct 30, 2020Updated 5 years ago
- MS17-010☆2,229Jun 20, 2023Updated 2 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- ☆1,190Apr 23, 2017Updated 8 years ago
- Example VBA Macro for MacOS Mojave☆67Oct 31, 2018Updated 7 years ago
- ☆1,488Dec 31, 2022Updated 3 years ago