pentestfunctions / CVE-2024-48990-PoC-TestingLinks
Testing POC for use cases
☆23Updated last year
Alternatives and similar repositories for CVE-2024-48990-PoC-Testing
Users that are interested in CVE-2024-48990-PoC-Testing are comparing it to the libraries listed below
Sorting:
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆50Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated 11 months ago
- ☆45Updated 2 years ago
- Crack Everything for CrackMapExec version 6☆20Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆73Updated 2 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆136Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆24Updated last year
- A couple of different scripts, made to automate attacks against NoSQL databases.☆67Updated last year
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆21Updated 3 years ago
- RCE Exploit For Maltrail-v0.53☆52Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆103Updated 10 months ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆130Updated 11 months ago
- Creating a Malicious Macro using MS Word☆24Updated 3 years ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆132Updated last week
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆117Updated last year
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆131Updated 8 months ago
- Ready to go Phishing Platform☆57Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆135Updated last year
- ☆112Updated 3 years ago
- Simple Python script that will set up a PHP server for stealing cookies - and provided the payload needed.☆38Updated 10 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 4 months ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆43Updated 2 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆90Updated last year
- A solution to create obfuscated reverse shells for PowerShell.☆82Updated 3 years ago
- Used to get NTLMv2 Hashes from SMB☆22Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆59Updated 2 years ago