djosix / rsmLinks
Reverse shell manager using tmux and ncat
☆36Updated last year
Alternatives and similar repositories for rsm
Users that are interested in rsm are comparing it to the libraries listed below
Sorting:
- My CTF & Bug Bounty writups☆26Updated 6 years ago
- encode a bash command with charset $, (, ), #, !, {, }, <, \, '.☆72Updated 6 years ago
- glibc getcwd() local privilege escalation compiled binaries☆32Updated 7 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- My attempt at writing exploit POCs for various CVEs☆16Updated 5 years ago
- Proof of Concept for a VSCode Python Extension Code Execution Vulnerability☆16Updated 5 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- A red team emulation tool deveoped by CyCraft Technology☆25Updated last year
- ☆15Updated 6 years ago
- ☆26Updated 4 months ago
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- Dead simple format string exploit payload generator☆24Updated 8 years ago
- My CTF Challenges☆23Updated 2 years ago
- Python Time Based Authentication Attack Tool☆22Updated 4 years ago
- ☆27Updated 6 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Updated 9 years ago
- CTF writeups☆54Updated 3 years ago
- Proof of calc for CVE-2019-6453☆50Updated 2 years ago
- Some exploits to bypass Safer Mode in Ghostscript☆18Updated 5 years ago
- Cisco RV110w UPnP stack overflow☆28Updated 4 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Updated 2 years ago
- Symbolic execution inspired PHP application scanner for code-path discovery☆34Updated 6 years ago
- Github Desktop RCE PoC☆28Updated 7 years ago
- ☆51Updated 8 years ago
- Linux kernel exploits for local privilege escalation☆81Updated 7 years ago
- PoC exploit for CVE-2018-11235 allowing RCE on git clone --recurse-submodules☆48Updated 5 years ago
- Gogs CVEs☆80Updated 6 years ago
- My CTF Challenges. No one plays.☆13Updated 3 years ago
- AIS3 2017 Binary Exploitation☆37Updated 8 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago