r1vs3c / searchbins
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
☆35Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for searchbins
- Automatic reverse/bind shell generator cheat sheet.☆35Updated last year
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆25Updated 2 weeks ago
- Máquina virtual para investigaciones en fuentes abiertas OSINT☆15Updated last month
- ☆14Updated 10 months ago
- PowerJoker is a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each Execution.☆34Updated 6 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated last month
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆35Updated 8 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆21Updated 2 weeks ago
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆44Updated last year
- Blog personal sobre resolución de CTF's, artículos y demás cosas locas en ciberseguridad :)☆15Updated 3 weeks ago
- Python script to exploit CVE-2020-14321 - Moodle 3.9 - Course enrollments allowed privilege escalation from teacher role into manager rol…☆19Updated 2 years ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆17Updated last year
- Exploits for some linux binaries :)☆30Updated this week
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆63Updated last year
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆43Updated last year
- Malicious Macro Generator for LibreOffice/OpenOffice☆16Updated last year
- ☆26Updated last year
- Collection of my talks and workshops about hacking & cybersecurity☆25Updated 4 months ago
- ☆62Updated last year
- Exploits for some windows binaries :)☆43Updated this week
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated 10 months ago
- Herramienta en PowerShell ideal para desplegar tu propio entorno AD vulnerable de forma automatizada.☆90Updated 11 months ago
- ☆15Updated 6 months ago
- Simple netexec wraper with html repport☆17Updated 5 months ago
- ☆92Updated last year
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆35Updated 10 months ago
- Red Teaming tools and techniques☆46Updated last year
- Exploit to dump ipmi hashes☆29Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆26Updated 9 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆26Updated 3 months ago