marco-lancini / hunt-for-cve-2018-10933
Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)
☆12Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for hunt-for-cve-2018-10933
- ☆1Updated 6 years ago
- CVE-2020-12828 PoC and Analysis.☆28Updated 4 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆31Updated 6 months ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- PoC ActiveX SVG Document Execution☆21Updated 6 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Updated 5 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- Asynchronous MSF RPC API wrapper☆20Updated last year
- Self defense post module for metasploit☆17Updated 5 years ago
- rev shell and manager in go☆20Updated 4 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Updated 5 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Updated 6 years ago
- Jira Information Gatherer☆28Updated 6 years ago
- Security Advisories☆10Updated 5 years ago
- A simple scanner to find and brute force tomcat manager logins☆28Updated 4 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆32Updated 4 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 6 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- Methods of C2☆21Updated 9 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆30Updated 9 years ago
- ☆29Updated 6 years ago
- Template for asynchronously controlling meterpreter sessions☆12Updated 6 years ago
- Microsoft Applocker evasion tool☆38Updated 4 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago