☆19Oct 2, 2022Updated 3 years ago
Alternatives and similar repositories for ProxyNotShell
Users that are interested in ProxyNotShell are comparing it to the libraries listed below
Sorting:
- ☆10Nov 21, 2023Updated 2 years ago
- Repo containing all info, scripts, etc. related to CVE-2021-44228☆10Dec 29, 2021Updated 4 years ago
- ☆13Dec 27, 2014Updated 11 years ago
- ☆12Apr 7, 2022Updated 3 years ago
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- Classic Bofa adapted to CobaltStrike.☆11Oct 4, 2022Updated 3 years ago
- 在一定条件下可执行命令☆11Feb 21, 2020Updated 6 years ago
- Runs programs as TrustedInstaller☆49Jul 1, 2019Updated 6 years ago
- ☆14Jun 22, 2022Updated 3 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- List of custom Nuclei templates☆16Nov 4, 2023Updated 2 years ago
- ☆11Apr 29, 2021Updated 4 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Minifilter Callback Patching Proof-of-Concept☆74Oct 31, 2022Updated 3 years ago
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- Simple PoCs for utilizing Windows syscalls in Go☆16Jan 13, 2021Updated 5 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Deleting Shadow Copies In Pure C++☆118Oct 31, 2022Updated 3 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Oct 30, 2022Updated 3 years ago
- ☆17Mar 25, 2019Updated 6 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Oct 10, 2022Updated 3 years ago
- ☆118Aug 7, 2022Updated 3 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆116Feb 27, 2021Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Sep 4, 2021Updated 4 years ago
- Dig through the Wayback Machine and find sensitive or forgotten files exposed by web servers over time.☆27Mar 27, 2025Updated 11 months ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- CVE-2023-6875 PoC☆25Jan 15, 2024Updated 2 years ago
- Spring Framework RCE (Quick pentest notes)☆17Apr 7, 2022Updated 3 years ago
- using the gpu to hide your payload☆64Aug 15, 2022Updated 3 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated 3 weeks ago
- Packer is a compact, fast and crosss-platform serialization library for store data in a buffer☆22Aug 5, 2023Updated 2 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Mar 10, 2023Updated 2 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Jun 2, 2022Updated 3 years ago
- It records your terminal, then lets you upload to ASHIRT☆29Feb 11, 2026Updated 2 weeks ago
- reverse proxy server☆19Jul 7, 2016Updated 9 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Feb 28, 2023Updated 3 years ago
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆24Mar 18, 2023Updated 2 years ago