This is Visual C# code that will create a new user named "mcfatty" when run as a service.
☆30Oct 4, 2018Updated 7 years ago
Alternatives and similar repositories for unquotedPoC
Users that are interested in unquotedPoC are comparing it to the libraries listed below
Sorting:
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- ☆54Jun 1, 2024Updated last year
- A proof of concept exploit that tries to pop you a shell on a uftpd server between versions 2.6 and 2.10☆20Apr 16, 2020Updated 5 years ago
- IPSec testing tool☆19Oct 19, 2024Updated last year
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 2 months ago
- A .net Crackme Challenge made for the SecTalks Brisbane 2017 Capture the Flag Event. Writeup/solution included.☆22Oct 2, 2017Updated 8 years ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- ☆26Jan 25, 2021Updated 5 years ago
- ☆29Apr 20, 2018Updated 7 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- D2R MapHack☆12Jun 10, 2022Updated 3 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago
- Juicy Potato for x86 Windows☆130Oct 12, 2019Updated 6 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Sep 9, 2021Updated 4 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Proof of Concept for CVE-2019-18634☆237Sep 12, 2021Updated 4 years ago
- A webscraper example in golang that scrapes list of projects from your Gitlab account.☆11Aug 22, 2018Updated 7 years ago
- Putting the block in blockchain☆11Dec 1, 2025Updated 3 months ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- RackHD Web UI☆11Jan 22, 2020Updated 6 years ago
- gh cli extension to create submodules inside a repo☆17Sep 20, 2024Updated last year
- Calculate the domain age with python script☆11Mar 27, 2018Updated 7 years ago
- My (newer) Emacs configuration☆14Sep 14, 2025Updated 5 months ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- CLI monitor for windows process- & file activity☆96Nov 20, 2020Updated 5 years ago
- Preparation for OSWE☆47Apr 19, 2020Updated 5 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆51Feb 22, 2024Updated 2 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- you idiots☆11Oct 30, 2024Updated last year
- A tweak to inspect any application (user or system application). Inspect views, network, local variables, NSUserDefault and even more.☆13Aug 20, 2019Updated 6 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- Git All the Payloads! A collection of web attack payloads.☆10Dec 31, 2018Updated 7 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago