mthbernardes / Derbie
A tool to generate malicious .deb files
☆18Updated 7 years ago
Alternatives and similar repositories for Derbie
Users that are interested in Derbie are comparing it to the libraries listed below
Sorting:
- ☆21Updated 8 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- public exploits☆35Updated 2 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 10 months ago
- AWS S3 Bucket/Object Finder☆24Updated 7 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆76Updated 6 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 4 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 6 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 7 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 7 years ago
- ☆25Updated 4 years ago
- All the Power with no Shell☆36Updated 3 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆66Updated 3 months ago
- ☆110Updated 7 years ago
- Scripts I used during CTP☆67Updated 4 years ago
- CVE-2018-8440 standalone exploit☆79Updated 6 years ago
- ☆36Updated 6 years ago
- ☆1Updated 6 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- Verification tools for CVE-2016-1287☆33Updated 8 years ago
- Samba, NFS shares spider and grepper☆70Updated 6 years ago
- Helper scripts to assist penetration testing and exploit development☆37Updated 5 months ago
- ☆52Updated 5 years ago
- VBA Reversed TCP Meterpreter Stager☆62Updated 7 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆78Updated 7 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- ☆79Updated 8 years ago
- C# Targeted Attack Reconnissance Tools☆122Updated 4 years ago