mr-r3b00t / CVE-2023-3519
☆14Updated last year
Related projects ⓘ
Alternatives and complementary repositories for CVE-2023-3519
- ☆25Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆34Updated last month
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 4 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆59Updated 7 months ago
- ☆51Updated 9 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆45Updated 8 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last year
- Lifetime AMSI bypass.☆36Updated 4 months ago
- Source code and examples for PassiveAggression☆54Updated 5 months ago
- vulnlab.com reaper writeup☆26Updated last year
- A C2 framework built for my bachelors thesis☆53Updated 3 weeks ago
- Encodes a payload within a generated mock-CSS file☆55Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆30Updated 5 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆63Updated 6 months ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆82Updated 7 months ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆64Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago
- ☆35Updated 11 months ago
- BloodHound PowerShell client☆45Updated last month
- Work, timer, and wait callback example using solely Native Windows APIs.☆83Updated 9 months ago
- malleable profile generator GUI for Havoc☆56Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 5 months ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆25Updated 8 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆16Updated this week
- exfiltration/infiltration toolkit☆23Updated 11 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆43Updated 2 months ago
- ☆36Updated 7 months ago
- ☆105Updated last year