Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3
☆27Aug 18, 2024Updated last year
Alternatives and similar repositories for contexter
Users that are interested in contexter are comparing it to the libraries listed below
Sorting:
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 9 months ago
- Submission, compilation and execution of C# code snippets, using an unmanaged CLR Host☆53Jan 29, 2015Updated 11 years ago
- Top 400 passwords as per HaveIBeenPwned☆22Oct 14, 2024Updated last year
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Aug 15, 2024Updated last year
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆17Nov 18, 2025Updated 3 months ago
- ☆14Jul 26, 2025Updated 7 months ago
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- Zone transfer a domain from its own NS servers and bruteforce subdomains☆12Mar 8, 2025Updated last year
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated 11 months ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated last year
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆31Jan 21, 2024Updated 2 years ago
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Nov 9, 2024Updated last year
- ☆18Jun 25, 2024Updated last year
- Authentication Bypass Vulnerability — CVE-2024–4358 — Telerik Report Server 2024☆12Nov 26, 2024Updated last year
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- ☆38Jan 7, 2025Updated last year
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- ☆18Nov 24, 2020Updated 5 years ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆207Aug 12, 2024Updated last year
- string encryption in Nim☆20Jun 15, 2024Updated last year
- POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal☆16Nov 26, 2024Updated last year
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Decrypt encrypted SonicOSX firmware images☆20Feb 24, 2025Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Public repo of some woking evilginx phishlets☆39Nov 4, 2024Updated last year
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Nov 16, 2023Updated 2 years ago
- A basic C2 framework written in C☆59Jul 7, 2024Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆44Apr 27, 2023Updated 2 years ago
- Manually perform syscalls without going through any external API or DLL.☆19Apr 19, 2023Updated 2 years ago
- Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injection☆13Jul 24, 2022Updated 3 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆14Mar 19, 2018Updated 7 years ago