xonoxitron / regreSSHionLinks
CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.
☆53Updated last year
Alternatives and similar repositories for regreSSHion
Users that are interested in regreSSHion are comparing it to the libraries listed below
Sorting:
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆139Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆154Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆79Updated last month
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆66Updated last year
- Polymorphic Command & Control☆91Updated 6 months ago
- ☆68Updated 7 months ago
- A collection of tools that I use in CTF's or for assessments☆101Updated 7 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆85Updated 6 months ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆65Updated 11 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆86Updated last year
- Script to retrieve the master password of a keepass database <= 2.53.1☆110Updated last year
- ☆134Updated 2 years ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated last year
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆162Updated 6 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆80Updated 3 years ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆146Updated last year
- Proof of concept & details for CVE-2025-21298☆189Updated 8 months ago
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆154Updated 7 months ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆124Updated this week
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆187Updated 6 months ago
- ☆36Updated 9 months ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆75Updated 5 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆225Updated 4 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆166Updated 3 months ago
- ☆50Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆102Updated last year
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆46Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆52Updated 2 years ago