dubs3c / sudo_sniffLinks
Steal user's password when running sudo for post-exploitation purposes
☆42Updated 5 years ago
Alternatives and similar repositories for sudo_sniff
Users that are interested in sudo_sniff are comparing it to the libraries listed below
Sorting:
- Powershell SMBv3 Compression checker☆28Updated 2 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- ☆33Updated 5 years ago
- Apache Module Backdoor (PoC)☆48Updated 6 years ago
- CoffeeShot: Avoid Detection with Memory Injection☆75Updated 7 years ago
- Shellcode Encrypter & Decrypter via XOR Cipher☆60Updated 6 years ago
- Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)☆40Updated 5 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆53Updated 6 years ago
- Burp Suite Attack Selector Plugin☆60Updated 7 years ago
- cve-2019-0604 SharePoint RCE exploit☆100Updated 6 years ago
- Tool aided persistence via Windows URI schemes abuse☆85Updated 5 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆110Updated 7 years ago
- initial commit☆44Updated 11 months ago
- rce exploit , made to work with pocsuite3☆122Updated 6 years ago
- Cobaltstrike Aggressor Scripts☆28Updated 8 years ago
- CVE-2020-12828 PoC and Analysis.☆29Updated 5 years ago
- Ex-pv8's☆64Updated 6 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆128Updated 3 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- Aggressor Script to launch IE driveby for CVE-2018-4878☆87Updated 7 years ago
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆145Updated 5 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- nmap service and application version detection (without nmap installation)☆115Updated 7 years ago
- Cobalt Strike Aggressor Scripts☆30Updated 8 years ago
- Using IPv6 to Bypass Security☆93Updated last month
- CVE-2019-15107 Webmin RCE (unauthorized)☆65Updated 6 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 5 years ago
- Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container☆47Updated last year
- The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813☆68Updated 5 years ago
- Python api for usage with cobalt strike's External C2 specification☆63Updated 6 years ago