rtsisyk / linux-iptables-contrack-exploit
Bypass the Linux Netfilter using conntrack helpers
☆23Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for linux-iptables-contrack-exploit
- Python script to detect bluekeep vulnerability (CVE-2019-0708) with TLS/SSL and x509 support☆27Updated 5 years ago
- Proof of calc for CVE-2019-6453☆50Updated 10 months ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆34Updated 6 years ago
- HP printer security research code☆53Updated 7 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆28Updated 4 years ago
- ☆13Updated 5 years ago
- ☆52Updated 5 years ago
- Remote Java classpath enumeration via deserialization☆22Updated last year
- public exploits☆35Updated last year
- ☆82Updated 10 years ago
- Repository containing many useful scripts☆73Updated 2 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Updated 5 years ago
- ☆34Updated 5 years ago
- GNU/Linux version of the https://github.com/inquisb/icmpsh slave☆22Updated 4 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆30Updated 9 years ago
- A rogue DNS detector☆23Updated last year
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Updated last week
- POC exploit code for CVE-2020-1048(PrintDemon)☆14Updated 4 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 6 years ago
- Data exfiltration using reflective DNS resolution covert channel☆51Updated 6 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago
- JSON Beautifier for Burp written in Java☆37Updated 5 years ago
- Stækka Metasploit - Extenting Metasploit☆53Updated 7 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 6 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- Privilege escalation using dmidecode☆19Updated 5 years ago
- Unified repository for different Metasploit Framework payloads☆47Updated 4 years ago