This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.
☆40Mar 27, 2024Updated last year
Alternatives and similar repositories for wget-root
Users that are interested in wget-root are comparing it to the libraries listed below
Sorting:
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 4 years ago
- PoC of CVE-2022-24707☆13May 3, 2022Updated 3 years ago
- CVE-2022-30780 - lighttpd remote denial of service☆17Mar 16, 2024Updated last year
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆41May 18, 2022Updated 3 years ago
- A Python script to find tenant id an region from a list of domain names.☆16Jan 31, 2025Updated last year
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeover☆16Jul 5, 2022Updated 3 years ago
- Tool to start processes as SYSTEM using token duplication☆37Oct 27, 2020Updated 5 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Apr 27, 2023Updated 2 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Converts binary files of 1C (1CD, cf, epf, efd, etc.) to grepable CSV☆12Feb 12, 2024Updated 2 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆103May 11, 2022Updated 3 years ago
- Reducing the private key through scalar multiplication using the ECPy + Google Colab library☆13Dec 7, 2022Updated 3 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- ☆26Feb 13, 2026Updated 3 weeks ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)☆25Aug 9, 2022Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- ☆13Oct 24, 2024Updated last year
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- Hide process,port,self under Linux using the ld_preload☆173Nov 18, 2021Updated 4 years ago
- Polymorphic code obfuscator for use in Red Team operations☆32Apr 13, 2022Updated 3 years ago
- ☆16Feb 12, 2022Updated 4 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- Kiddy - (linux) kernel identity spoofer☆15Mar 18, 2024Updated last year
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- A Python/Scapy based ARP Cache Poisoning tool.☆12Apr 3, 2016Updated 9 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Static analysis of wordpress plugins☆59Dec 16, 2020Updated 5 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- Perform arp spoofing attack in C☆14Aug 18, 2023Updated 2 years ago