h0mbre / phpscanLinks
☆15Updated 4 years ago
Alternatives and similar repositories for phpscan
Users that are interested in phpscan are comparing it to the libraries listed below
Sorting:
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 5 years ago
- ☆19Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- treafik fronted c2 examples☆26Updated 4 years ago
- ☆35Updated 4 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- Helper script to deal with offsets when doing work in debuggers.☆12Updated 5 years ago
- AMSI detection PoC☆31Updated 5 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 4 months ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆23Updated 4 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- ☆10Updated 4 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- Tool for pivoting over SMB pipes☆17Updated 5 years ago
- Run PowerShell command without invoking powershell.exe☆35Updated 3 years ago
- ADD/SUB encoder for alphanumeric shellcode☆9Updated 5 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- ☆23Updated 3 years ago
- parsers to make life easier☆13Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- ☆20Updated 5 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Noob Penetration tester☆11Updated last year
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year