fbkcs / msf-elf-in-memory-execution
Post module for Metasploit to execute ELF in memory
☆84Updated 5 years ago
Related projects: ⓘ
- ☆67Updated this week
- ☆43Updated this week
- ☆70Updated this week
- A weaponized version of CVE-2018-9206☆62Updated 5 years ago
- ☆51Updated this week
- sploit☆67Updated 4 years ago
- ☆29Updated this week
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Updated 5 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆54Updated 7 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆125Updated 2 years ago
- Metasploit msfvenom Bash Completions Generator☆40Updated 8 years ago
- Custom THP Dropper☆27Updated 6 years ago
- POC for CVE-2018-0824☆85Updated last year
- ☆60Updated this week
- Unified repository for different Metasploit Framework payloads☆47Updated 4 years ago
- Automates credential skimming from service accounts in Windows Registry☆73Updated 3 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆58Updated 5 years ago
- Python api for usage with cobalt strike's External C2 specification☆61Updated 5 years ago
- Aggressor Script to launch IE driveby for CVE-2018-4878☆87Updated 6 years ago
- ☆58Updated this week
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Updated 6 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Updated 6 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 6 years ago
- CVE-2019-0604☆132Updated 5 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆107Updated 6 years ago
- Use Waitfor.exe to maintain persistence☆55Updated 3 years ago
- POC for Cobalt Strike external C2☆121Updated 3 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 5 years ago
- CVE-2019-0859 1day Exploit☆120Updated 4 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 5 years ago