xonoxitron / regreSSHion
CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.
☆47Updated 10 months ago
Alternatives and similar repositories for regreSSHion
Users that are interested in regreSSHion are comparing it to the libraries listed below
Sorting:
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆79Updated 2 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated 8 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆76Updated 7 months ago
- Polymorphic Command & Control☆77Updated 2 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆153Updated last year
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆107Updated 8 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆110Updated 3 months ago
- execute PE in memory Filelessly☆37Updated 3 months ago
- Tools and Resources for Physical Security Red Teaming☆31Updated last month
- Basic script to generate reverse shell payloads, generally most used in ctf.☆29Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆52Updated 7 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆98Updated last year
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆86Updated 5 months ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆51Updated 2 years ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆186Updated 2 months ago
- Proof of concept & details for CVE-2025-21298☆177Updated 3 months ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 7 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆150Updated last week
- POC exploit for CVE-2024-49138☆249Updated 2 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆95Updated last year
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆161Updated 2 months ago
- ☆137Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆51Updated 4 months ago
- A collection of tools that I use in CTF's or for assessments☆97Updated 3 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆77Updated 2 years ago
- ☆52Updated 3 months ago
- ☆35Updated 5 months ago
- Repo for all my exploits/PoCs☆50Updated last week
- Our Tips&Tricks☆117Updated 2 months ago