xonoxitron / regreSSHionLinks
CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.
☆53Updated last year
Alternatives and similar repositories for regreSSHion
Users that are interested in regreSSHion are comparing it to the libraries listed below
Sorting:
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆137Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆154Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆85Updated 6 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆86Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆249Updated this week
- Polymorphic Command & Control☆89Updated 5 months ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆123Updated this week
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆75Updated last week
- CVE-2023-38831 PoC (Proof Of Concept)☆87Updated last year
- Proof of concept & details for CVE-2025-21298☆189Updated 7 months ago
- ☆67Updated 7 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated 7 months ago
- Script to retrieve the master password of a keepass database <= 2.53.1☆106Updated last year
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆155Updated 5 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆114Updated 7 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆65Updated 11 months ago
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆94Updated 5 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆153Updated 6 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆199Updated last year
- A collection of tools that I use in CTF's or for assessments☆101Updated 7 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆79Updated 3 years ago
- Unauthenticated Remote Code Execution via Angular-Base64-Upload Library☆26Updated last month
- Make BASH stealthy and hacker friendly with lots of bash functions☆261Updated 2 months ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆252Updated 2 weeks ago
- ☆105Updated 11 months ago
- PowerShell Obfuscator☆192Updated this week
- ☆136Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆145Updated last year