kpcyrd / sh4d0wupLinks
Signing-key abuse and update exploitation framework
☆130Updated 3 months ago
Alternatives and similar repositories for sh4d0wup
Users that are interested in sh4d0wup are comparing it to the libraries listed below
Sorting:
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆132Updated 10 months ago
- eBPF hacks☆187Updated 9 months ago
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆99Updated 2 years ago
- Quick network scanner library. https://crates.io/crates/qscan☆86Updated 2 years ago
- WallEscape vulnerability in util-linux☆52Updated last year
- Get root via TTY / TIOCSTI stuffing☆76Updated 4 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆89Updated 2 years ago
- clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerabil…☆98Updated 2 years ago
- Rust in-memory dumper☆108Updated 2 years ago
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆29Updated 2 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 7 months ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆64Updated 9 months ago
- Remote Command executor☆77Updated 2 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆48Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆67Updated 11 months ago
- A tool to attack ARP☆15Updated 4 years ago
- Rust Weaponization for Red Team Engagements.☆28Updated 2 years ago
- Automate converting webshells into reverse shells.☆70Updated last month
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆131Updated 10 months ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- Cloud Exploit Framework☆114Updated 3 years ago
- Find what egress ports are allowed☆42Updated 2 years ago
- POC for DLL Proxying / Hijacking☆62Updated 3 months ago
- ☆110Updated 10 months ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated last month
- masscan with exclusive excludes☆58Updated last year
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆50Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year