roycewilliams / kens-salty-rainbow
An archive of descrypt hashes for common non-personal passwords
☆29Updated 2 years ago
Alternatives and similar repositories for kens-salty-rainbow:
Users that are interested in kens-salty-rainbow are comparing it to the libraries listed below
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- A Linux RAT in C☆32Updated 6 years ago
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- A tool to create a SOCKS proxy server out of UPnProxy vulnerable device(s).☆81Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- A PNG file-smuggling tool and library!☆24Updated last year
- Configure SPI flash write protection.☆23Updated 4 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆15Updated last year
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Application Hijack Scanner for macOS☆69Updated 3 years ago
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆77Updated 5 years ago
- DDoor - cross platform backdoor using dns txt records☆30Updated 3 years ago
- An unauthenticated PoC for CVE-2020-0796☆21Updated 4 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated last year
- dragon.c: sniffing, non binding, reverse down/exec, portknocking service * Based on cd00r.c by fx@phenoelit.de and helldoor.c by drizzt@…☆9Updated 11 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆31Updated 3 years ago
- Local Privilege Escalation Miner☆25Updated 2 years ago
- macOS codesigning translocation vulnerability.☆42Updated 3 years ago
- Dumping credentials through windbg and pykd☆40Updated last year
- ☆31Updated 3 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆28Updated last year
- The best way to send emails in Go.☆10Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 5 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆72Updated last year
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 3 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffi…☆29Updated 3 years ago