demon-i386 / pop_n_bubble
Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro
☆69Updated last week
Alternatives and similar repositories for pop_n_bubble:
Users that are interested in pop_n_bubble are comparing it to the libraries listed below
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆119Updated 4 months ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆110Updated 3 months ago
- A collection of tools that I use in CTF's or for assessments☆97Updated 2 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆229Updated last week
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆109Updated 3 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆152Updated 5 months ago
- Lena's repo of Malware Monsters aka Malmons.☆27Updated 2 months ago
- In-Memory Rootkit For Linux☆69Updated this week
- Python implementation of GhostPack's Seatbelt situational awareness tool☆257Updated 5 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆75Updated last month
- A delicious, but malicious SSL-VPN server 🌮☆218Updated 4 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆258Updated 4 months ago
- Styx is an cross-platform GUI interface for HackTheBox made in GoLang☆24Updated 8 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆76Updated 7 months ago
- Reaping treasures from strings in remote processes memory☆252Updated 2 months ago
- WMI virus, because funny☆278Updated 2 months ago
- ☆186Updated last year
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆86Updated 8 months ago
- ☆58Updated 6 months ago
- A list of all Active Directory machines from HackTheBox☆58Updated 3 weeks ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆163Updated last week
- macos stealer poc☆77Updated this week
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆53Updated 3 weeks ago
- Collection of codes focused on Linux rootkits☆106Updated 2 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆139Updated 3 weeks ago
- Weaponizing DCOM for NTLM Authentication Coercions☆206Updated 2 weeks ago
- Windows rootkit designed to work with BYOVD exploits☆183Updated 3 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆102Updated last month
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆147Updated 10 months ago