-
Coder|RedTeam
- Singapore
-
-
-
thc-tips-tricks-hacks-cheat-sheet Public
Forked from hackerschoice/thc-tips-tricks-hacks-cheat-sheetVarious tips & tricks
C UpdatedSep 6, 2023 -
-
cf Public
Forked from kepler404/cfCloud Exploitation Framework 云环境利用框架,方便安全人员在获得 AK 的后续工作
-
Three-EyedRaven Public
内网探测工具(Internal network detection tool that not contain any exploit code)
-
-
-
DesertFox Public
Implement load Cobalt Strike & Metasploit&Sliver shellcode with golang
-
iscsicpl_bypassUAC Public
Forked from hackerhouse-opensource/iscsicpl_bypassUACUAC bypass for x64 Windows 7 - 11(无弹窗版)
-
html-Absorber Public
一款可批量提取url或本地html文件中注释、属性及标签内容的工具
-
-
Pentest_MindMap Public
个人翻译/总结渗透测试思维导图
-
weakenDefenderPriv Public
Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.
-
metasploit-framework Public
Forked from rapid7/metasploit-frameworkMetasploit Framework
-
Windows-ReverseShell Public
Simple reverse shell to avoid Windows defender and kaspersky detection
-
log4shell Public
Forked from NCSC-NL/log4shellOperational information regarding the vulnerability in the Log4j logging library.
UpdatedDec 15, 2021 -
CallbackHell Public
Forked from ly4k/CallbackHellPoC (DoS) for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)
C++ MIT License UpdatedOct 17, 2021 -
CVE-2021-37980 Public
Forked from ZeusBox/CVE-2021-37980PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)
C++ UpdatedOct 12, 2021 -
An OS command injection vulnerability in FortiWeb's management interface (version 6.3.11 and prior) can allow a remote, authenticated attacker to execute arbitrary commands on the system, via the S…
-
checkAVProc Public
Check if there is any anti-software process in current operating environment
-
CVE-2021-31166 Public
PoC for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. Although it was defined as remote command execution, it can only cause the system to crash.
-
The tool is used to match and scan the website directory when the source code is known