ferreiraklet / wolfy
Wolfy AV Bypasser
☆28Updated 2 years ago
Alternatives and similar repositories for wolfy:
Users that are interested in wolfy are comparing it to the libraries listed below
- Nuclei template and information about the POC for CVE-2024-25600☆28Updated last year
- List of some AD tools I frequently use☆46Updated 2 months ago
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- Proof-of-concept exploit for CVE-2024-25153.☆42Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆60Updated 4 months ago
- PoC for CVE-2024-42327 / ZBX-25623☆18Updated 4 months ago
- CVE-2024-27956 WordPress Automatic < 3.92.1 - Unauthenticated SQL Injection☆18Updated 11 months ago
- A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)☆24Updated last year
- ☆38Updated 2 months ago
- Exploits targeting vBulletin.☆76Updated 2 years ago
- Used to get NTLMv2 Hashes from SMB☆12Updated 5 months ago
- Proof of Concept Exploit for CVE-2024-9464☆45Updated 6 months ago
- backdoor exploit for vsftpd 2.3.4 on python☆15Updated last year
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures …☆34Updated 10 months ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆37Updated 2 years ago
- Dump Windows SAM hashes☆42Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year
- ☆54Updated 5 months ago
- Authentication Bypass in GoAnywhere MFT☆61Updated last year
- ☆15Updated 3 months ago
- Morpheus is a memory dumper that extracts lsass.exe in RAM and exfiltrates it via forged NTP packets. It uses RC4 encryption and Reed-Sol…☆88Updated last week
- Phishing Framework for OTP codes☆19Updated last week