xonoxitron / regreSSHionLinks
CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.
☆61Updated last year
Alternatives and similar repositories for regreSSHion
Users that are interested in regreSSHion are comparing it to the libraries listed below
Sorting:
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆156Updated last year
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆161Updated last year
- Polymorphic Command & Control☆101Updated 9 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆94Updated this week
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 9 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆119Updated 10 months ago
- linikatz is a tool to attack AD on UNIX☆151Updated 2 years ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 9 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆215Updated 7 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆156Updated 9 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated last year
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆346Updated 3 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆129Updated 8 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆332Updated this week
- Everything and anything related to password spraying☆151Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆145Updated 10 months ago
- ☆36Updated last year
- PowerShell Obfuscator☆221Updated 3 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆82Updated 3 years ago
- A delicious, but malicious SSL-VPN server 🌮☆253Updated 2 months ago
- CVE-2025-49144 PoC for security researchers to test and try.☆84Updated 5 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- Script to retrieve the master password of a keepass database <= 2.53.1☆113Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148Updated last year
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆200Updated 2 months ago
- POC exploit for CVE-2024-49138☆265Updated 9 months ago
- ☆106Updated last year
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆66Updated last year
- Continuous password spraying tool☆195Updated last week
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆172Updated 6 months ago