wunderwuzzi23 / Offensive-BPFLinks
Various BPF resources, tools, scripts and experiments created while learning more about the eBPF technology.
☆21Updated 3 years ago
Alternatives and similar repositories for Offensive-BPF
Users that are interested in Offensive-BPF are comparing it to the libraries listed below
Sorting:
- Active Directory Password Spray Testing Utility in Go☆18Updated last year
- ☆116Updated 2 years ago
- ☆73Updated last year
- A Qemu Proxmox Template builder project using Packer☆70Updated 2 months ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆42Updated 4 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆75Updated 10 months ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆72Updated 3 months ago
- ☆53Updated 2 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Updated 3 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Updated 3 years ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆23Updated 6 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Updated 2 years ago
- Proof Of Concepts☆55Updated last month
- Simple Chatbot for testing AI Red Team tooling☆16Updated last year
- ☆49Updated 2 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Updated 6 months ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 5 years ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆73Updated 2 years ago
- A tool to abuse Exchange services☆12Updated last year
- Exploits Unauth Docker API☆43Updated 9 months ago
- ☆43Updated 3 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- Java archive implant toolkit.☆61Updated 9 months ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year
- ☆63Updated last year
- Presentaciones de congresos☆55Updated last year
- LDAP Swiss Army Knife☆51Updated 2 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆67Updated 4 years ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago