sajith / mod-rootmeLinks
Ye olde root shell for ye olde httpd
☆44Updated 10 years ago
Alternatives and similar repositories for mod-rootme
Users that are interested in mod-rootme are comparing it to the libraries listed below
Sorting:
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 7 years ago
- HP printer security research code☆91Updated 7 years ago
- Cisco IOS SNMP RCE PoC☆247Updated 7 years ago
- Exploits and advisories☆202Updated last month
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 7 months ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Python api for usage with cobalt strike's External C2 specification☆242Updated 2 years ago
- a simple portforwarder in ps1 with embeded c# code☆90Updated 7 years ago
- Python tool to inject fake updates into unencrypted WSUS traffic☆114Updated 9 years ago
- Some exploits, which I’ve created during my OSCE preparation.☆83Updated 7 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆72Updated last month
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- Ex-pv8's☆64Updated 6 years ago
- Poc for CVE-2019-1253☆155Updated 3 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆109Updated 7 years ago
- CobaltStrike External C2 for Websockets☆197Updated 6 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 5 years ago
- ☆22Updated 9 years ago
- CVE-2019-0604☆133Updated 6 years ago
- Constrained Language Mode + AMSI bypass all in one☆160Updated 6 years ago
- Unified repository for different Metasploit Framework payloads☆48Updated 5 years ago
- Windows Stagers to circumvent restrictive network environments☆67Updated last year
- Malleable C2 profiles for Cobalt Strike☆74Updated 3 years ago
- Python api for usage with cobalt strike's External C2 specification☆71Updated 7 years ago
- Gogs CVEs☆79Updated 5 years ago
- POC for Cobalt Strike external C2☆138Updated 4 years ago
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Updated 8 years ago
- PoC code for CVE-2019-0841 Privilege Escalation vulnerability☆240Updated 6 years ago