josh0xA / K55Links
Linux x86_64 Process Injection Utility
☆58Updated 4 years ago
Alternatives and similar repositories for K55
Users that are interested in K55 are comparing it to the libraries listed below
Sorting:
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆47Updated 5 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated 8 months ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 5 years ago
- ☆50Updated 5 years ago
- adding a backdooruser using win32api☆80Updated 5 years ago
- ☆38Updated 5 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated 2 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Updated 5 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Updated 6 years ago
- Nmap script to check vulnerability CVE-2021-21972☆27Updated 4 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Updated 5 years ago
- Execute Mimikatz with different technique☆51Updated 4 years ago
- ☆71Updated 4 years ago
- A standalone WMI protocol for CrackMapExec☆51Updated 5 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 4 years ago
- DO NOT RUN THIS.☆47Updated 4 years ago
- I used this to see if an EDR is running in Safe Mode☆36Updated 4 years ago
- gui uac bypass (netplwiz.exe)☆66Updated 6 years ago
- PoC CVE-2020-6308☆37Updated 5 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 5 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 4 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated 2 years ago
- Exploits, Exploits, Exploits and more Exploits!☆33Updated 5 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆94Updated 4 years ago
- Red Team C2 and Post Exploitation code☆35Updated 5 months ago
- ☆71Updated 5 years ago
- A Golang implant that uses Slack as a command and control server☆47Updated 5 years ago
- Injects shellcode into remote processes using direct syscalls☆77Updated 5 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Updated 4 years ago