holly-hacker / git-dumper
A tool to dump exposed .git repositories
☆49Updated 3 months ago
Alternatives and similar repositories for git-dumper:
Users that are interested in git-dumper are comparing it to the libraries listed below
- DNS over HTTPS targeted malware (only runs once)☆96Updated last year
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆125Updated 3 months ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆79Updated 3 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆116Updated last month
- Create and enumerate hidden desktops.☆90Updated last year
- My new C2 framework☆40Updated 2 years ago
- Cookie & Logins stealer for Firefox + Chrome, demonstration only☆11Updated last year
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆100Updated last month
- JAR, Java, and JSP shells that work on Linux OS, macOS, and Windows OS.☆59Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated 2 months ago
- random code snippets, useful for getting started☆116Updated 3 months ago
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆39Updated 7 months ago
- Command line client for HackTheBox☆22Updated 11 months ago
- rcat☆67Updated 2 years ago
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆109Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 3 weeks ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆62Updated 11 months ago
- Polymorphic Command & Control☆65Updated 4 months ago
- A way to use fonts to obfuscate text.☆43Updated 2 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆135Updated last year
- Quickly find all identities someone has used on their Github commits☆15Updated 6 months ago
- Repo for all my exploits/PoCs☆37Updated this week
- Execute invisible JavaScript by abusing Hangul filler characters. Inspired by Martin Kleppe's INVISIBLE.js.☆10Updated 4 months ago
- Python TCP server for terminal rickrolls☆11Updated 3 years ago
- Example of CVE-2024-24576 use case.☆57Updated 10 months ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Updated last year
- A reconnaissance tool for ethical hackers written in RUST☆20Updated 10 months ago
- Automate converting webshells into reverse shells.☆67Updated this week
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆14Updated last month
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Updated 6 months ago