holly-hacker / git-dumper
A tool to dump exposed .git repositories
☆47Updated 2 months ago
Alternatives and similar repositories for git-dumper:
Users that are interested in git-dumper are comparing it to the libraries listed below
- Cookie & Logins stealer for Firefox + Chrome, demonstration only☆11Updated last year
- Copy and paste commands to quickly transfer files between hosts.☆25Updated 3 years ago
- Execute invisible JavaScript by abusing Hangul filler characters. Inspired by Martin Kleppe's INVISIBLE.js.☆10Updated 3 months ago
- This is a simple example of DLL hijacking enabling proxy execution.☆65Updated last year
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆125Updated 2 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆14Updated 3 weeks ago
- CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent☆5Updated last year
- DNS over HTTPS targeted malware (only runs once)☆95Updated last year
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆92Updated last week
- My new C2 framework☆40Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated last month
- A way to use fonts to obfuscate text.☆43Updated 2 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆115Updated 3 weeks ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆61Updated 10 months ago
- ☆56Updated 2 years ago
- Polymorphic Command & Control☆62Updated 3 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated last year
- Command line client for HackTheBox☆21Updated 10 months ago
- JAR, Java, and JSP shells that work on Linux OS, macOS, and Windows OS.☆59Updated last year
- rcat☆64Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆65Updated 4 months ago
- Get root via TTY / TIOCSTI stuffing☆66Updated 6 months ago
- Create and enumerate hidden desktops.☆89Updated last year
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Updated 5 months ago
- Collection Of Reverse Shell that can easily generate using Python3☆58Updated 11 months ago
- [PoC] Command injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)☆89Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆52Updated last year
- Quickly find all identities someone has used on their Github commits☆15Updated 5 months ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆79Updated 2 years ago