kpcyrd / sh4d0wupLinks
Signing-key abuse and update exploitation framework
☆130Updated 3 months ago
Alternatives and similar repositories for sh4d0wup
Users that are interested in sh4d0wup are comparing it to the libraries listed below
Sorting:
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆132Updated 9 months ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 3 months ago
- clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerabil…☆99Updated 2 years ago
- Remote Command executor☆77Updated 2 years ago
- Rust in-memory dumper☆108Updated 2 years ago
- Quick network scanner library. https://crates.io/crates/qscan☆86Updated 2 years ago
- Rust Weaponization for Red Team Engagements.☆28Updated 2 years ago
- eBPF hacks☆187Updated 8 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆99Updated 2 years ago
- Linux Enumeration / Privilege escalation tool☆24Updated 4 years ago
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆50Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆66Updated 11 months ago
- WallEscape vulnerability in util-linux☆51Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 6 months ago
- masscan with exclusive excludes☆58Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆89Updated 2 years ago
- Cloud Exploit Framework☆114Updated 3 years ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated last month
- DNS over HTTPS targeted malware (only runs once)☆98Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- Find what egress ports are allowed☆42Updated 2 years ago
- Rust-based password mutator for brute force attacks☆13Updated 5 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆131Updated 9 months ago
- A tool to attack ARP☆15Updated 4 years ago
- Detect and remove the presence of canary tokens☆22Updated last year
- ☆49Updated 2 years ago
- Automate converting webshells into reverse shells.☆69Updated 2 weeks ago