demon-i386 / pop_n_bubble
Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro
☆73Updated last month
Alternatives and similar repositories for pop_n_bubble
Users that are interested in pop_n_bubble are comparing it to the libraries listed below
Sorting:
- Tool designed to exfiltrate OneDrive Business OCR Data☆112Updated 3 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆119Updated 4 months ago
- macos stealer poc☆113Updated 3 weeks ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆187Updated 2 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆150Updated 2 weeks ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆107Updated last month
- A delicious, but malicious SSL-VPN server 🌮☆219Updated 5 months ago
- ☆116Updated 3 weeks ago
- A collection of tools that I use in CTF's or for assessments☆97Updated 3 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆36Updated 2 weeks ago
- A repository of credential stealer formats☆215Updated last month
- Polymorphic Command & Control☆78Updated 2 months ago
- Embed a payload inside a PNG file☆316Updated 6 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆177Updated last month
- WMI virus, because funny☆282Updated 3 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆131Updated 3 weeks ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆76Updated 8 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆129Updated last month
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆78Updated 2 months ago
- Collection of codes focused on Linux rootkits☆107Updated 2 months ago
- ☆62Updated last month
- ☆52Updated 3 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆53Updated last month
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆110Updated 4 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆274Updated last month
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆154Updated 6 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆103Updated 2 months ago
- The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful u…☆28Updated 3 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆98Updated last year