holly-hacker / git-dumper
A tool to dump exposed .git repositories
☆53Updated 5 months ago
Alternatives and similar repositories for git-dumper:
Users that are interested in git-dumper are comparing it to the libraries listed below
- CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent☆5Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆14Updated 3 months ago
- rcat☆67Updated 3 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆63Updated last year
- DNS over HTTPS targeted malware (only runs once)☆96Updated last year
- Command line client for HackTheBox☆22Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 3 months ago
- Create and enumerate hidden desktops.☆90Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆119Updated 3 months ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆80Updated 3 years ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆105Updated 2 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆69Updated 5 months ago
- JAR, Java, and JSP shells that work on Linux OS, macOS, and Windows OS.☆59Updated last year
- Automate converting webshells into reverse shells.☆67Updated 3 weeks ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆102Updated last week
- Tool to enable blind sql injection attacks against websockets using sqlmap☆58Updated last year
- A way to use fonts to obfuscate text.☆43Updated 2 years ago
- My new C2 framework☆40Updated 2 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆14Updated 7 months ago
- 「🧹」Clear logs after an invasion☆17Updated 3 months ago
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs step…☆16Updated last week
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆134Updated 2 months ago
- Basic reverse shell in C using socket() with complete explanation☆65Updated last year
- An experimental high-performance DNS query bruteforce tool built with AF_XDP for extremely fast and accurate bulk DNS lookups.☆78Updated last week
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆110Updated last year
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆31Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆41Updated 2 months ago
- A port of classic netcat to C#☆31Updated 2 years ago
- random code snippets, useful for getting started☆118Updated 4 months ago
- Python TCP server for terminal rickrolls☆11Updated 3 years ago