maxamin / exploitpack-from-an-APT-infrastructure
exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructure
☆14Updated 2 years ago
Alternatives and similar repositories for exploitpack-from-an-APT-infrastructure:
Users that are interested in exploitpack-from-an-APT-infrastructure are comparing it to the libraries listed below
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Zombie Content management systems exploitation Bot Source☆10Updated 2 years ago
- Windows 权限提升 BadPotato☆12Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 2 years ago
- legacy Botnets source code Forked from github.com/malwares☆21Updated 2 years ago
- ☆51Updated 2 years ago
- A simple command line interface for webshells☆23Updated last year
- Proof of Concept for CVE-2023-23397 in Python☆27Updated last year
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆62Updated 2 years ago
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Updated 2 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆34Updated last year
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆30Updated 4 months ago
- POC of CVE-2021-2394☆22Updated 3 years ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆36Updated 4 months ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆20Updated 3 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆34Updated 2 years ago
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- A testing Red Team Infrastructure created with Docker☆32Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆86Updated 3 years ago
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆48Updated 2 years ago
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related…☆17Updated 2 years ago
- Site fast fuzzing with chorme extension.☆25Updated 2 years ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Updated last year
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆88Updated last year