ewilded / icmpsh-s-linux
GNU/Linux version of the https://github.com/inquisb/icmpsh slave
☆22Updated 5 years ago
Alternatives and similar repositories for icmpsh-s-linux:
Users that are interested in icmpsh-s-linux are comparing it to the libraries listed below
- Ping Exfiltration Command and Control (PiX-C2)☆30Updated 9 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Updated 5 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- ☆25Updated 7 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- CVE-2020-12828 PoC and Analysis.☆28Updated 4 years ago
- PoC CVE-2020-6308☆34Updated 4 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Updated 4 years ago
- A Flexible Web Shell Client, Built on Electron☆13Updated 2 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- ☆19Updated 4 years ago
- PoC for CVE-2020-11651☆6Updated 4 years ago
- ☆13Updated last year
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆28Updated 4 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4☆36Updated 5 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆27Updated 3 years ago
- shell over icmp☆31Updated 11 years ago
- A simple scanner to find and brute force tomcat manager logins☆28Updated 5 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Updated 5 years ago
- (Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 – Unauthenticated Arbitrary File Upload☆17Updated 5 years ago
- ☆31Updated 4 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆24Updated 5 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 5 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆17Updated 5 years ago
- Exploit code for CVE-2020-11579, an arbitrary file disclosure through the MySQL client in PHPKB☆22Updated last year
- An example of a downloader written in NodeJS.☆24Updated 3 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆14Updated 5 years ago
- Apache Module Backdoor (PoC)☆48Updated 5 years ago