v4resk / red-book
The Red-book: The Art of Offensive CyberSecurity
☆44Updated this week
Alternatives and similar repositories for red-book:
Users that are interested in red-book are comparing it to the libraries listed below
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- Repo for all my exploits/PoCs☆50Updated last month
- Windows Privilege Escalation☆56Updated 2 years ago
- ☆38Updated 2 months ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆51Updated last year
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646☆27Updated last year
- List of some AD tools I frequently use☆46Updated last month
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆49Updated 10 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆41Updated 2 years ago
- CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent☆5Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆59Updated 3 months ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆66Updated last year
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- CVE-2024-27956 WordPress Automatic < 3.92.1 - Unauthenticated SQL Injection☆18Updated 11 months ago
- External recon toolkit☆46Updated 3 months ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆37Updated 2 years ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆72Updated 6 months ago
- Fortinet FortiClient EMS SQL Injection☆47Updated last year
- Exploits targeting vBulletin.☆76Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- POC FortiOS SSL-VPN buffer overflow vulnerability☆27Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆81Updated last year
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 2 months ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆75Updated last year
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated last year
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆24Updated last week
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 7 months ago
- Classic Web shell upload techniques & Web RCE techniques☆27Updated 4 months ago