kpcyrd / sh4d0wupLinks
Signing-key abuse and update exploitation framework
☆130Updated 2 months ago
Alternatives and similar repositories for sh4d0wup
Users that are interested in sh4d0wup are comparing it to the libraries listed below
Sorting:
- Quick network scanner library. https://crates.io/crates/qscan☆86Updated 2 years ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 2 months ago
- clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerabil…☆99Updated 2 years ago
- eBPF hacks☆187Updated 7 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆130Updated 8 months ago
- WallEscape vulnerability in util-linux☆51Updated last year
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆98Updated 2 years ago
- Rust in-memory dumper☆108Updated 2 years ago
- Detect and remove the presence of canary tokens☆22Updated last year
- Find what egress ports are allowed☆42Updated 2 years ago
- Rust Weaponization for Red Team Engagements.☆27Updated 2 years ago
- Cloud Exploit Framework☆114Updated 3 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated last week
- Mara is a userland pty/tty sniffer☆53Updated last year
- NIST-based CVE lookup store and API powered by Rust.☆132Updated last month
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆66Updated 10 months ago
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆50Updated last year
- Left To My Own Devices - NT hash tools☆33Updated 3 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- masscan with exclusive excludes☆57Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆66Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 6 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆130Updated 9 months ago
- LD_PRELOAD rootkit☆134Updated last year
- reverse shell using curl☆206Updated 5 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- 🌒 Shell command obfuscation to avoid detection systems☆125Updated 2 years ago
- POC for DLL Proxying / Hijacking☆61Updated 2 months ago