rtsisyk / linux-iptables-contrack-exploit
Bypass the Linux Netfilter using conntrack helpers
☆24Updated 9 years ago
Alternatives and similar repositories for linux-iptables-contrack-exploit:
Users that are interested in linux-iptables-contrack-exploit are comparing it to the libraries listed below
- Repository containing many useful scripts☆74Updated 2 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆34Updated 6 years ago
- HP printer security research code☆53Updated 7 years ago
- ☆51Updated 7 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆28Updated 4 years ago
- ☆11Updated 2 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 6 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Proof of calc for CVE-2019-6453☆49Updated last year
- public exploits☆35Updated last year
- Repo for proof of concept exploits and tools.☆56Updated 4 years ago
- An example rootkit that gives a userland process root permissions☆78Updated 5 years ago
- Test and exploit for CVE-2017-12542☆86Updated 6 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- Data exfiltration using reflective DNS resolution covert channel☆51Updated 7 years ago
- ☆72Updated 5 years ago
- ☆20Updated 6 years ago
- Hack In Paris 2018 Slideware☆17Updated 6 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆30Updated 9 years ago
- ☆52Updated 5 years ago
- ☆59Updated 4 years ago
- ☆52Updated 5 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 8 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Updated 5 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Updated 2 months ago