☆14Aug 31, 2021Updated 4 years ago
Alternatives and similar repositories for IPMI_Exploits
Users that are interested in IPMI_Exploits are comparing it to the libraries listed below
Sorting:
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- AntSword Generate Shell Plugin☆12Jun 26, 2022Updated 3 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- couchdb remote command exec.☆14Mar 27, 2018Updated 7 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- 常用系统服务默认端口列表☆13Apr 25, 2017Updated 8 years ago
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- A script to attack users who are RDPing into a machine and recurse this attack. For security testers and attack simulations.☆19Jun 29, 2017Updated 8 years ago
- The domain enumeration and scanning tool for hackers☆18Sep 29, 2024Updated last year
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Nov 1, 2019Updated 6 years ago
- SilkETW & SilkService☆40Aug 14, 2019Updated 6 years ago
- Direct shell in C. Reverse shell in C. Both over TCP.☆36Dec 14, 2016Updated 9 years ago
- ☆122Mar 6, 2018Updated 7 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Feb 18, 2023Updated 3 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Aug 12, 2019Updated 6 years ago
- ☆18Aug 31, 2021Updated 4 years ago
- Exploit for PlaySMS 1.4 authenticated RCE☆14Nov 6, 2018Updated 7 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 7 years ago
- ☆16Mar 4, 2019Updated 6 years ago
- 搜索几个网站的云盘资源,并过滤到失效链接,最后不保证资源的有效性☆20Jun 25, 2018Updated 7 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- DEF CON 26 WorkShop - Fuzzing FTW☆20Aug 9, 2018Updated 7 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- A Zhiyuan OA Collaborative Office Remote Code Execution Vulnerability on Windows☆37Jun 27, 2019Updated 6 years ago
- ☆105Dec 9, 2019Updated 6 years ago