☆16Oct 18, 2024Updated last year
Alternatives and similar repositories for beginner-kernel-exploitation-setup
Users that are interested in beginner-kernel-exploitation-setup are comparing it to the libraries listed below
Sorting:
- ☆11Aug 31, 2023Updated 2 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- ☆18Mar 26, 2024Updated last year
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆55Dec 8, 2023Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- ☆19Sep 24, 2025Updated 5 months ago
- Python code to Serialize and Unserialize java binary serialization format.☆30Feb 18, 2026Updated last week
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Mar 31, 2022Updated 3 years ago
- Nuclei template and information about the POC for CVE-2024-25600☆31Feb 21, 2024Updated 2 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- NoirGate provides on-demand ephemeral anonymous shells secured by TOTP☆34Apr 29, 2024Updated last year
- ☆22Jan 12, 2024Updated 2 years ago
- M365 Defender SOC Playbooks☆24Feb 6, 2023Updated 3 years ago
- PassBreaker☆65Apr 5, 2024Updated last year
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- ☆33Apr 23, 2023Updated 2 years ago
- Early Bird APC Injection in Rust☆63Oct 9, 2024Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- OmniCrawl is a web measurement tool that allows for recording of web requests and JavaScript browser API accesses on multiple platforms.☆27Mar 20, 2024Updated last year
- OG Atomic Red Team☆29Jun 12, 2018Updated 7 years ago
- ☆65Jul 6, 2023Updated 2 years ago
- Garudaastra Tool is based on python3 to find cameras around the world☆28Jun 29, 2023Updated 2 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Sep 20, 2024Updated last year
- PoC repository for CVE-2023-29007☆36Apr 26, 2023Updated 2 years ago
- Web Penetration Testing Course Materials☆32May 13, 2024Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- Exploits targeting vBulletin.☆75Apr 15, 2023Updated 2 years ago
- Brute force cracking the compressed package | 暴力破解有密码的压缩包☆36Feb 17, 2026Updated last week