Lists (23)
Sort Name ascending (A-Z)
C2
DLL
DNS/TAKEOVER
CCDMN
AV/EDR
SCAN
PWSH
HTML-SMUGG
web3+etc
LNK
LINKSLOGS
🥔 lpe
HAVOC
PHISH
olalaR00tkiT
AD
Active Directory
SERVER
hosting, webdav and etcSH3LL
pwn
API
✒️Sign
SQL
WAF
- All languages
- Assembly
- Astro
- AutoIt
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- Classic ASP
- D
- Dockerfile
- Elixir
- Go
- HTML
- Hack
- Haskell
- Inno Setup
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- NASL
- Nim
- PHP
- Pascal
- Perl
- PowerShell
- PureBasic
- Python
- REXX
- Rich Text Format
- Ruby
- Rust
- Shell
- Solidity
- TypeScript
- VBA
- VBScript
- Visual Basic .NET
- Vue
- Wikitext
- XSLT
- YAML
- YARA
- Zig
Starred repositories
The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).
PoC Exploit for the NTLM reflection SMB flaw.
一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接
Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell
VMware vCenter Server远程代码执行漏洞 (CVE-2021-21972)批量检测脚本
VMware vCenter 未授权RCE(CVE-2021-21972)
CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script
PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)
CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server
CVE-2021-22005 - VMWare vCenter Server File Upload to RCE
Exploit for CVE-2020-3952 in vCenter 6.7
Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.
wspcoerce coerces a Windows computer account via SMB to an arbitrary target using MS-WSP
Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)
Execute commands interactively on remote Windows machines using the WinRM protocol
Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.
i am silly for posting this, pasters enjoy. vuln driver checker with way to many paste available features
This repository contains C++ code to load custom drivers by exploiting a vulnerable driver in Windows. This project demonstrates a technique to bypass DSE (Driver Signature Enforcement) and PatchGu…
Here you can find some vulnerable Windows Kernel Drivers
this simple tool scans drivers for potential arbitrary writing vulnurabilities using their IAT. this tool was used as part of my windows rootkit to initially search for vulnurable drivers to exploi…
Use RTCore64 to map your driver on windows 11.
Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445
HookChain: A new perspective for Bypassing EDR Solutions