tonyarris / srvView external linksLinks
A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE exploitation.
☆15Mar 15, 2024Updated last year
Alternatives and similar repositories for srv
Users that are interested in srv are comparing it to the libraries listed below
Sorting:
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆29Jun 26, 2023Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Jun 18, 2025Updated 7 months ago
- ☆20Dec 29, 2024Updated last year
- CVE-2023-1671-POC, based on dnslog platform☆17Apr 26, 2023Updated 2 years ago
- A collection of red blue team staff☆48Jun 1, 2023Updated 2 years ago
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Dec 6, 2022Updated 3 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Nov 17, 2022Updated 3 years ago
- CVE-2024-4577 RCE PoC☆25Nov 20, 2024Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- Modified version of Pypykatz to print encrypted credentials☆56Dec 26, 2022Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- Offsec Pentest and Bug Bounty Notes☆25May 28, 2020Updated 5 years ago
- ☆10Dec 13, 2022Updated 3 years ago
- ☆36Oct 26, 2023Updated 2 years ago
- Proof-of-Concept for Server Side Request Forgery (SSRF) in request-baskets (<= v.1.2.1)☆30Aug 9, 2023Updated 2 years ago
- offensive security scripts and documentation☆30Dec 9, 2025Updated 2 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- SI.py☆14Oct 28, 2022Updated 3 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆96Nov 14, 2024Updated last year
- ☆38Dec 14, 2024Updated last year
- PoC for CVE-2024-27130☆36May 17, 2024Updated last year
- ☆42Sep 28, 2024Updated last year
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 5 years ago
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆30Jan 27, 2026Updated 2 weeks ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- A tool to detect who's cutting the internet on your network☆13Apr 30, 2020Updated 5 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 3 months ago
- ☆11Oct 17, 2024Updated last year
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- ☆14Jul 26, 2017Updated 8 years ago
- This tool is a simple ffuf launcher which lets you select dynamically which wordlist and which extentions you want to fuzz.☆10Sep 10, 2025Updated 5 months ago