mthbernardes / fsudo
Steal users password with a fake sudo function.
☆42Updated 6 months ago
Related projects: ⓘ
- A cross platform tool for verifying credentials and executing single commands☆32Updated 5 years ago
- ☆18Updated this week
- Protect your servers with a secret header☆28Updated 4 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 4 years ago
- ☆23Updated 4 years ago
- ☆25Updated this week
- ADD/SUB encoder for alphanumeric shellcode☆9Updated 4 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Updated 8 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆32Updated 4 years ago
- ☆29Updated this week
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆19Updated 4 years ago
- Apfell implant written in C#.☆8Updated 3 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆13Updated 6 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆42Updated 7 years ago
- SSDP Service Discovery☆16Updated 5 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆16Updated 7 years ago
- various slides and presentations I've worked on☆18Updated 6 months ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- Microsoft Applocker evasion tool☆38Updated 4 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆18Updated 5 years ago
- ☆28Updated 6 years ago
- ☆69Updated 5 years ago
- Collection of things I've written on pentests to make life easier.☆15Updated 5 years ago
- Random code snippets☆9Updated 10 months ago
- Methods of C2☆21Updated 9 years ago
- ☆20Updated 5 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆19Updated 2 years ago