☆14Aug 31, 2021Updated 4 years ago
Alternatives and similar repositories for IPMI_Exploits
Users that are interested in IPMI_Exploits are comparing it to the libraries listed below
Sorting:
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Nov 1, 2019Updated 6 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- AntSword Generate Shell Plugin☆12Jun 26, 2022Updated 3 years ago
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- couchdb remote command exec.☆14Mar 27, 2018Updated 7 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- 常用系统服务默认端口列表☆13Apr 25, 2017Updated 8 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Feb 11, 2025Updated last year
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- ☆122Mar 6, 2018Updated 8 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- american fuzzy lop fuzzer from lcamtuf☆14Oct 31, 2014Updated 11 years ago
- ☆105Dec 9, 2019Updated 6 years ago
- Telegram bot utilizing OpenAI's GPT to generate presentations and abstracts in PPTX and DOCX formats.☆10Jan 10, 2024Updated 2 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This applicatio…☆14Mar 26, 2014Updated 11 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- CVE-2017-10271 POC☆29Jan 10, 2018Updated 8 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 7 years ago
- A script to attack users who are RDPing into a machine and recurse this attack. For security testers and attack simulations.☆19Jun 29, 2017Updated 8 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Feb 18, 2023Updated 3 years ago
- ACTIVELabs Security Advisories☆24May 19, 2021Updated 4 years ago
- SilkETW & SilkService☆40Aug 14, 2019Updated 6 years ago
- One CTF Platform☆20Dec 4, 2019Updated 6 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- A memctl core for jailbroken iOS devices.☆11May 14, 2018Updated 7 years ago