marco-lancini / hunt-for-cve-2018-10933
Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)
☆12Updated 6 years ago
Alternatives and similar repositories for hunt-for-cve-2018-10933:
Users that are interested in hunt-for-cve-2018-10933 are comparing it to the libraries listed below
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- Leak windows system info through a docx file☆12Updated 4 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Updated 6 years ago
- ☆1Updated 6 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 6 years ago
- A simple scanner to find and brute force tomcat manager logins☆28Updated 5 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- PoC for CVE-2020-11651☆6Updated 4 years ago
- Useful Windows and AD tools☆15Updated 2 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- Self defense post module for metasploit☆17Updated 5 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆14Updated 5 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- Data exfiltration using reflective DNS resolution covert channel☆51Updated 7 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Simulates a logged in user.☆16Updated 6 months ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- ☆24Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆32Updated 5 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆19Updated 6 years ago
- PoC ActiveX SVG Document Execution☆21Updated 6 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆30Updated 9 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆20Updated 4 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13Updated 5 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆31Updated 8 months ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 4 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Updated 5 years ago
- SSDP Service Discovery☆16Updated 6 years ago