hannob / smtpsmug
☆98Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for smtpsmug
- Tools for finding SMTP smuggling vulnerabilities.☆106Updated 7 months ago
- reverse shell using curl☆205Updated 7 months ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆31Updated 2 years ago
- Postfix SMTP Smuggling - Expect Script POC☆26Updated 10 months ago
- ☆15Updated 6 months ago
- masscan with exclusive excludes☆55Updated last year
- Signing-key abuse and update exploitation framework☆121Updated last week
- NTP Exfiltration Tool☆136Updated last year
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆19Updated 2 years ago
- Get root via TTY / TIOCSTI stuffing☆62Updated 4 months ago
- ☆25Updated 3 weeks ago
- eBPF hacks☆173Updated 2 months ago
- The Red-book: The Art of Offensive CyberSecurity☆31Updated this week
- ☆23Updated 2 months ago
- PoC for CVE-2024-27130☆32Updated 6 months ago
- WallEscape vulnerability in util-linux☆49Updated 7 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆205Updated this week
- Proof of concept for DoS exploit☆52Updated last year
- Signature based honeypot detector tool written in Golang☆84Updated 6 months ago
- PoC for CVE-2023-20126☆20Updated last year
- KeyTrap (DNSSEC)☆41Updated 9 months ago
- expand and report on a given domain's SPF policy☆48Updated 8 months ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆60Updated this week
- End-to-end Encrypted DNS Tunnelling and C2 framework☆65Updated last month
- IVRE's fork of the famous TCP port scanner. See below for details.☆41Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆134Updated last week
- a smart DNS response-guided subdomain fuzzer☆146Updated last year
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients (CVE-2023-51385)☆47Updated last year
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆58Updated last month
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆121Updated 3 weeks ago