ethicalhackeragnidhra / LaZagneLinks
☆10Updated 7 years ago
Alternatives and similar repositories for LaZagne
Users that are interested in LaZagne are comparing it to the libraries listed below
Sorting:
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Windows 权限提升 BadPotato☆13Updated 4 years ago
- Use md5-collisions to make evil executables looking like a good one.☆30Updated 5 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Updated 3 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Dumping credentials through windbg and pykd☆41Updated last year
- ☆14Updated 3 years ago
- Password list character frequency analyzer that can output hashcat masks☆17Updated 6 years ago
- Advisories and Proofs of Concept by BlackArrow☆19Updated 7 months ago
- Obtain and parse SSL certificates☆10Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- webshells written with malice☆25Updated 7 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.☆10Updated last year
- ☆16Updated 2 years ago
- miscellaneous sploit scripts/hacks☆16Updated 5 months ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- ☆12Updated 4 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆36Updated 3 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆36Updated 6 months ago
- the most basic DLL ever to pop a cmd.☆24Updated 5 years ago