xonoxitron / regreSSHionLinks
CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.
☆62Updated last year
Alternatives and similar repositories for regreSSHion
Users that are interested in regreSSHion are comparing it to the libraries listed below
Sorting:
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆156Updated last year
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆165Updated last year
- Polymorphic Command & Control☆102Updated 10 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Updated 10 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆100Updated last month
- CVE-2025-56383-Proof-of-Concept☆53Updated 3 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆81Updated last year
- A collection of tools that I use in CTF's or for assessments☆106Updated 11 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆219Updated 8 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- ☆36Updated last year
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated last year
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆175Updated 7 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆120Updated last year
- ☆132Updated 2 years ago
- ☆75Updated 11 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated last year
- Tools and Resources for Physical Security Red Teaming☆46Updated 2 months ago
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆53Updated last year
- Proof of concept & details for CVE-2025-21298☆193Updated 11 months ago
- A delicious, but malicious SSL-VPN server 🌮☆260Updated 3 months ago
- Everything and anything related to password spraying☆151Updated last year
- POC exploit for CVE-2024-49138☆266Updated 11 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆139Updated 9 months ago
- ☆156Updated 9 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆117Updated last year
- ☆103Updated 11 months ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Updated 9 months ago
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- Script to retrieve the master password of a keepass database <= 2.53.1☆113Updated last year