xonoxitron / regreSSHionLinks
CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.
☆60Updated last year
Alternatives and similar repositories for regreSSHion
Users that are interested in regreSSHion are comparing it to the libraries listed below
Sorting:
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆156Updated last year
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆158Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 8 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆86Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆85Updated 2 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆119Updated 10 months ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆54Updated 2 years ago
- Polymorphic Command & Control☆100Updated 8 months ago
- Detect common NFS server misconfigurations☆70Updated 5 months ago
- linikatz is a tool to attack AD on UNIX☆148Updated 2 years ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆213Updated 6 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆145Updated 10 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆48Updated last year
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆133Updated 3 weeks ago
- A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.☆114Updated 4 months ago
- ☆72Updated 9 months ago
- Script to retrieve the master password of a keepass database <= 2.53.1☆113Updated last year
- CVE-2025-49144 PoC for security researchers to test and try.☆84Updated 4 months ago
- Proof of concept & details for CVE-2025-21298☆191Updated 9 months ago
- SharePoint WebPart Injection Exploit Tool☆300Updated 3 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 4 months ago
- Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence☆335Updated last week
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 8 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 9 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆81Updated last year
- POC exploit for CVE-2024-49138☆263Updated 9 months ago
- CVE-2023-38831 PoC (Proof Of Concept)☆88Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆252Updated last month
- Everything and anything related to password spraying☆150Updated last year
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆170Updated 5 months ago