jbaines-r7 / hook
Proof of Concept for WatchGuard Authenticated Arbitrary File Read (CVE-2022-31749)
☆10Updated 2 years ago
Alternatives and similar repositories for hook:
Users that are interested in hook are comparing it to the libraries listed below
- A little implant which SSH's back with a shell☆36Updated 3 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆26Updated 4 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Alternative Mimikatz LSASS DUMPER☆12Updated 4 years ago
- ☆19Updated 4 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆28Updated last year
- Run PowerShell command without invoking powershell.exe☆35Updated 3 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆46Updated 4 years ago
- Tomcat backdoor based on CS blog☆27Updated last year
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 4 years ago
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- PoC CVE-2020-6308☆34Updated 4 years ago
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Updated 2 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆21Updated 6 years ago
- RCE in NPM VSCode Extension☆20Updated 3 years ago
- Kudzu is a Go C2 platform with an emphasis on extensibility.☆11Updated 3 years ago
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago
- treafik fronted c2 examples☆26Updated 4 years ago
- Post-Exploitation script to exfiltrate 7-zip files☆10Updated 2 years ago
- ☆18Updated 2 years ago
- ☆18Updated 2 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆18Updated last year
- ☆13Updated last year
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆47Updated 3 years ago
- Reverse shell macro using Word VBA☆13Updated 4 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆15Updated last year