xonoxitron / regreSSHionLinks
CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.
☆57Updated last year
Alternatives and similar repositories for regreSSHion
Users that are interested in regreSSHion are comparing it to the libraries listed below
Sorting:
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆153Updated last year
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆156Updated last year
- Polymorphic Command & Control☆97Updated 7 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆85Updated 2 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆70Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 7 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆86Updated last year
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆129Updated this week
- A collection of tools that I use in CTF's or for assessments☆102Updated 8 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆144Updated 9 months ago
- linikatz is a tool to attack AD on UNIX☆147Updated 2 years ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆236Updated this week
- ☆71Updated 8 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆86Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 7 months ago
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆167Updated 7 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆116Updated 9 months ago
- A delicious, but malicious SSL-VPN server 🌮☆252Updated 3 weeks ago
- Proof of concept & details for CVE-2025-21298☆190Updated 9 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆211Updated 6 months ago
- ☆137Updated last year
- ☆132Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆154Updated 8 months ago
- ☆51Updated last year
- Collection of codes focused on Linux rootkits☆177Updated last month
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆137Updated 6 months ago
- ☆14Updated 2 years ago
- Detect common NFS server misconfigurations☆67Updated 4 months ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆105Updated 3 years ago
- ☆105Updated last year