-
Freelancer
- anonymous
- https://127.0.0.1/your-computer.php
Lists (1)
Sort Name ascending (A-Z)
Starred repositories
Build an Installable Debian 11 Bullseye Image with all possible customization
windows-kernel-exploits WindowsεΉ³ε°ζζζΌζ΄ιε
0xRh4ps00dy / Auto-Bspwm
Forked from r1vs3c/auto-bspwmBash script that automates the setup of a professional hacking environment for Kali Linux using the tiled window manager bspwm.
π» π π³ π² My riced-up Kali dotfiles β off-white | dark leet | chrome lambo
Python3 script to quickly get various information from a domain controller through his LDAP service.
A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for eβ¦
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 9β¦
Microsoft-Outlook-Remote-Code-Execution-Vulnerability
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Collection of Cyber Threat Intelligence sources from the deep and dark web
We have made you a wrapper you can't refuse
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
An LDAP based Active Directory user and group enumeration tool
alien-keric / CVE-2023-32315
Forked from miko550/CVE-2023-32315Openfire Console Authentication Bypass Vulnerability with RCE plugin
Openfire Console Authentication Bypass Vulnerability with RCE plugin
Impacket is a collection of Python classes for working with network protocols.
A PoC exploit for CVE-2023-32315 - Openfire Authentication Bypass
Minecraft-client networking library in Python
A list of interesting payloads, tips and tricks for bug bounty hunters.
Open Cyber Threat Intelligence Platform
A curation of awesome security tools, exploits security projects developed by Tanzanian Cybersecurity Enthusiasts
How to exploit SeImpersonatePrivilege with different ways