qwqoro / Mail-Injection
π§ [Research] E-Mail Injection: Vulnerable applications
β14Updated 11 months ago
Alternatives and similar repositories for Mail-Injection:
Users that are interested in Mail-Injection are comparing it to the libraries listed below
- exfiltration/infiltration toolkitβ23Updated last year
- Make an Linux Kernel rootkit visible again.β50Updated last month
- Monitor your target continuously for new subdomains!β26Updated 2 years ago
- POC for CVE-2024-3183 (FreeIPA Rosting)β20Updated 8 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3β22Updated 8 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.β21Updated 9 months ago
- Burp Suite Extension for inserting a magic byte into responder's requestβ24Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privilegesβ22Updated 5 months ago
- Slides and videos from talks given at consβ13Updated 9 months ago
- ECC Public Key Cryptographyβ37Updated last year
- A small red team courseβ37Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.β29Updated last year
- Widget Options β The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Executionβ12Updated 4 months ago
- Docker container for running CobaltStrike 4.10β37Updated 7 months ago
- β10Updated 4 months ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.β20Updated last year
- Situational Awareness script to identify how and where to run implantsβ50Updated 4 months ago
- Tool for scanning domains for .git directories.β16Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domainβ39Updated last year
- A Python script to find tenant id an region from a list of domain names.β14Updated 2 months ago
- Slides from my talk at the Adversary Village, Defcon 30β29Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the serverβ46Updated 2 months ago
- This map lists the essential techniques to bypass anti-virus and EDRβ15Updated last year
- Breaking Active Directory Security with πβ32Updated 5 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting commaβ¦β33Updated last year
- β27Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstalβ¦β34Updated 5 months ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.β19Updated 2 weeks ago
- RCE PoC for Empire C2 framework <5.9.3β26Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishingβ45Updated last month