HP printer security research code
☆91Nov 20, 2017Updated 8 years ago
Alternatives and similar repositories for HPwn
Users that are interested in HPwn are comparing it to the libraries listed below
Sorting:
- HP printer security research code☆55Nov 20, 2017Updated 8 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 8 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- ☆12May 9, 2017Updated 8 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Jan 24, 2021Updated 5 years ago
- siberas JMX exploitation toolkit☆130Mar 13, 2023Updated 2 years ago
- PHP root (suid) reverse shell☆74Jun 22, 2017Updated 8 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Jan 9, 2018Updated 8 years ago
- This is a concept poc of command and control server implemented over blockchain☆56Aug 13, 2019Updated 6 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- A WebSocket C2 Tool☆411Nov 24, 2017Updated 8 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆152Oct 20, 2018Updated 7 years ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,217Aug 2, 2024Updated last year
- Script to generate malicious debian packages (debain trojans).☆120Apr 24, 2019Updated 6 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- SkyRAT - Powershell Remote Administration Tool☆34Jan 8, 2018Updated 8 years ago
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- Reverse shell and rootkit☆19Apr 28, 2017Updated 8 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- Keylogger built in C# .NET for Win 7/8/8.1/10☆34Dec 2, 2016Updated 9 years ago
- CVE-2017-11882 File Generator PoC☆35Nov 22, 2017Updated 8 years ago
- ld_preload userland rootkit☆35Dec 13, 2020Updated 5 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Sep 14, 2017Updated 8 years ago
- ☆264Jul 15, 2022Updated 3 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆526Apr 14, 2023Updated 2 years ago
- A web application for running shell commands interactively on your server☆21Dec 22, 2016Updated 9 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- Powershell SAP assessment tool☆199Aug 13, 2018Updated 7 years ago
- VBS Reversed TCP Meterpreter Stager☆88May 25, 2017Updated 8 years ago