xonoxitron / regreSSHionView external linksLinks
CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.
☆62Jul 2, 2024Updated last year
Alternatives and similar repositories for regreSSHion
Users that are interested in regreSSHion are comparing it to the libraries listed below
Sorting:
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆18Mar 20, 2025Updated 10 months ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 4 months ago
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- ☆29Sep 4, 2024Updated last year
- ☆14Mar 19, 2024Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆12May 17, 2024Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated 10 months ago
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- VBA Macro obfuscator☆13Sep 20, 2020Updated 5 years ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- ☆23Mar 17, 2024Updated last year
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- IrisCTF 2023 challenges.☆16Jan 23, 2023Updated 3 years ago
- Malicious Shortcut(.lnk) Generator☆86Nov 23, 2018Updated 7 years ago
- ☆22Dec 30, 2025Updated last month
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- utility for sysmocom SIM card products; read-only mirror of https://gitea.sysmocom.de/sysmocom/sysmo-usim-tool☆21Jan 25, 2026Updated 2 weeks ago
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- ☆22Jun 9, 2025Updated 8 months ago
- The BUSSide☆19Oct 10, 2021Updated 4 years ago
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 9 months ago
- Top hashpwn rules☆21Dec 12, 2025Updated 2 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- GTPv1/GTPv2 Dialer☆30Nov 26, 2025Updated 2 months ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆29Oct 2, 2025Updated 4 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- CVE-2024-30090 - LPE PoC☆108Oct 17, 2024Updated last year
- Golden collection of weak passwords☆71Dec 12, 2024Updated last year
- TCAP (MAP/CAP) transaction tracking for pcap files☆28Jan 24, 2026Updated 3 weeks ago
- This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCo…☆30Aug 5, 2024Updated last year
- CVE-2023-21554 Windows MessageQueuing PoC,分析见 https://www.zoemurmure.top/posts/cve_2023_21554/☆57May 18, 2023Updated 2 years ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 6 months ago
- ☆42Jun 1, 2025Updated 8 months ago
- ☆30Aug 24, 2025Updated 5 months ago
- Universal root exploit for the linux kernel☆38Apr 30, 2024Updated last year