magisterquis / wtrtdtmlbView external linksLinks
What's the Red Team doing to my Linux Box? - BSides Vienna 2024
☆17Nov 23, 2024Updated last year
Alternatives and similar repositories for wtrtdtmlb
Users that are interested in wtrtdtmlb are comparing it to the libraries listed below
Sorting:
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- ☆21Sep 23, 2025Updated 4 months ago
- ☆19Dec 12, 2023Updated 2 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆33Jan 27, 2026Updated 2 weeks ago
- ☆21Jan 8, 2026Updated last month
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- Security Blogs - A simple aggregator for security news/blog☆24Jan 19, 2026Updated 3 weeks ago
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合☆10Jul 30, 2022Updated 3 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 8, 2026Updated last week
- ☆17Jan 9, 2025Updated last year
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆60Feb 5, 2026Updated last week
- Extract the Procedures (TTP) from CTI reports☆16Dec 13, 2025Updated 2 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆76Nov 11, 2024Updated last year
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆200Nov 12, 2024Updated last year
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- c3p0 new gadget☆28Apr 1, 2025Updated 10 months ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 8 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆163Feb 22, 2024Updated last year
- ☆19Dec 5, 2024Updated last year
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- A collection of my public security advisories.☆28Nov 10, 2025Updated 3 months ago
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated 11 months ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆128Oct 4, 2024Updated last year
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Exploit for CVE-2024-4885☆17Jul 8, 2024Updated last year
- ☆35Feb 5, 2026Updated last week
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- ☆88Jul 31, 2022Updated 3 years ago