mthbernardes / sshLooterC
It's the C version of https://github.com/mthbernardes/sshLooter
☆263Updated last year
Alternatives and similar repositories for sshLooterC:
Users that are interested in sshLooterC are comparing it to the libraries listed below
- cve-2020-0688☆322Updated last year
- Bluekeep(CVE 2019-0708) exploit released☆105Updated 5 years ago
- ntlm relay attack to Exchange Web Services☆328Updated 6 years ago
- Shellcode wrapper with encryption for multiple target languages☆433Updated 7 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆350Updated 5 years ago
- A proof of concept for the RDP Inception Attack☆343Updated 7 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆534Updated 4 years ago
- A backdoor module for Apache2☆193Updated 4 years ago
- ☆286Updated 4 years ago
- Multiplatform reverse shell generator☆581Updated 4 years ago
- SimpleShellcodeInjector receives as an argument a shellcode in hex and executes it. It DOES NOT inject the shellcode in a third party ap…☆257Updated 3 years ago
- A WebSocket C2 Tool☆388Updated 7 years ago
- Hershell is a simple TCP reverse shell written in Go.☆529Updated 5 years ago
- NTDS.dit offline dumper with non-elevated☆211Updated 6 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆170Updated 4 years ago
- The great CrackMapExec tool compiled for Windows☆255Updated 8 years ago
- A Simple Backdoor For Apache HTTP Server☆152Updated 3 months ago
- Exploit and detect tools for CVE-2020-0688☆352Updated 4 years ago
- Kerberos Exploitation Kit☆144Updated 10 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆344Updated 3 years ago
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆143Updated 4 years ago
- CVE-2018-8581☆370Updated 2 years ago
- Cobalt Strike Python API☆293Updated 2 years ago
- CVE-2020–14882、CVE-2020–14883☆282Updated 4 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆728Updated 3 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆338Updated 3 years ago
- Exploit for CVE-2020-3952 in vCenter 6.7☆270Updated 4 years ago