demon-i386 / pop_n_bubbleLinks
Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro
☆74Updated last month
Alternatives and similar repositories for pop_n_bubble
Users that are interested in pop_n_bubble are comparing it to the libraries listed below
Sorting:
- ☆147Updated last month
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆119Updated 5 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆144Updated last month
- macos stealer poc☆114Updated last month
- Tool designed to exfiltrate OneDrive Business OCR Data☆114Updated 4 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆40Updated last month
- WMI virus, because funny☆281Updated 4 months ago
- Lena's repo of Malware Monsters aka Malmons.☆37Updated last week
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆53Updated 2 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆180Updated last month
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- A collection of tools that I use in CTF's or for assessments☆98Updated 4 months ago
- A delicious, but malicious SSL-VPN server 🌮☆229Updated 6 months ago
- A repository of credential stealer formats☆217Updated 2 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆260Updated 6 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆171Updated 7 months ago
- ☆188Updated last year
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆156Updated last week
- Python3 utility for creating zip files that smuggle additional data for later extraction☆211Updated 3 weeks ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆108Updated 2 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆191Updated 3 months ago
- ☆183Updated last month
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆148Updated 11 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆306Updated last week
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆113Updated 4 months ago
- Lab used for workshop and CTF☆240Updated 2 weeks ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆48Updated 2 months ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆213Updated this week
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 2 months ago
- ☆100Updated 3 months ago