#Cobalt_Strike random C2 Profile generator
https://github.com/threatexpress/random_c2_profile
#Cobalt_Strike Aggressor Scripts
https://github.com/timwhitez/Cobalt-Strike-Aggressor-Scripts
Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.exe" by using DCOM object
https://github.com/netero1010/TrustedPath-UACBypass-BOF
A list of JARM hashes for different ssl implementations used by some C2/red team tools
https://github.com/cedowens/C2-JARM
grab beacon config
https://github.com/whickey-r7/grab_beacon_config
https://github.com/threatexpress/random_c2_profile
#Cobalt_Strike Aggressor Scripts
https://github.com/timwhitez/Cobalt-Strike-Aggressor-Scripts
Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.exe" by using DCOM object
https://github.com/netero1010/TrustedPath-UACBypass-BOF
A list of JARM hashes for different ssl implementations used by some C2/red team tools
https://github.com/cedowens/C2-JARM
grab beacon config
https://github.com/whickey-r7/grab_beacon_config
The project is compiled based on the LandGrey/SpringBootVulExploit list The purpose is to quickly exploit vulnerabilities during hvv and lower the threshold for exploiting vulnerabilities
https://github.com/0x727/SpringBootExploit
h2-jdbc(https://github.com/h2database/h2database/issues/3195) & mysql-jdbc(CVE-2021-2471) SQLXML XXE vulnerability reproduction
https://github.com/SecCoder-Security-Lab/jdbc-sqlxml-xxe
https://github.com/0x727/SpringBootExploit
h2-jdbc(https://github.com/h2database/h2database/issues/3195) & mysql-jdbc(CVE-2021-2471) SQLXML XXE vulnerability reproduction
https://github.com/SecCoder-Security-Lab/jdbc-sqlxml-xxe
#Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver's implants support C2 over Mutual TLS (mTLS), WireGuard, HTTP(S), and DNS. Implants are dynamically compiled with unique X.509 certificates signed by a per-instance certificate authority generated when you first run the binary
_ support MacOS, Windows, and Linux Implants are supported on MacOS, Windows, and Linux (and possibly every Golang compiler target but we've not tested them all)
https://github.com/BishopFox/sliver
_ support MacOS, Windows, and Linux Implants are supported on MacOS, Windows, and Linux (and possibly every Golang compiler target but we've not tested them all)
https://github.com/BishopFox/sliver
#crawlergo A powerful browser crawler for web vulnerability scanners
https://github.com/Qianlitp/crawlergo
https://github.com/Qianlitp/crawlergo
#trojan-go The Trojan proxy implemented by Go supports multiplexing/routing functions/CDN relay/Shadowsocks obfuscation plug-in, multi-platform, no dependencies
https://github.com/p4gefau1t/trojan-go
https://github.com/p4gefau1t/trojan-go
#openvpn-install road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
https://github.com/Nyr/openvpn-install
#wireguard-install road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
https://github.com/Nyr/wireguard-install
https://github.com/Nyr/openvpn-install
#wireguard-install road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
https://github.com/Nyr/wireguard-install
exploit for #CVE-2021-40449, a Windows LPE via a UAF in win32kfull!GreResetDCInternal
https://github.com/hakivvi/CVE-2021-40449
https://github.com/hakivvi/CVE-2021-40449
#Fugu14 Untethered iOS 14 Jailbreak
Supported Devices/iOS Versions all arm64e devices (iPhone XS and newer) on iOS 14.3 - 14.5.1
https://github.com/LinusHenze/Fugu14
Supported Devices/iOS Versions all arm64e devices (iPhone XS and newer) on iOS 14.3 - 14.5.1
https://github.com/LinusHenze/Fugu14
#Thread_Stack_Spoofing PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts
https://github.com/mgeeky/ThreadStackSpoofer
#RustSCRunner Shellcode Runner/Injector in Rust using NTDLL functions directly with the ntapi Library
https://github.com/memN0ps/RustSCRunner
https://github.com/mgeeky/ThreadStackSpoofer
#RustSCRunner Shellcode Runner/Injector in Rust using NTDLL functions directly with the ntapi Library
https://github.com/memN0ps/RustSCRunner
#CVE-2021-22005 - #VMWare vCenter Server File Upload to #RCE
https://github.com/r0ckysec/CVE-2021-22005
https://github.com/r0ckysec/CVE-2021-22005
#MHDDoS Best DDoS Attack Script Python3, Cyber Attack With 36 Method
https://github.com/MHProDev/MHDDoS
https://github.com/MHProDev/MHDDoS
#CVE-2021-22205 Unauthorized RCE
https://github.com/r0eXpeR/CVE-2021-22205
#CVE-2021-22205& GitLab CE/EE RCE
https://github.com/Al1ex/CVE-2021-22205
https://github.com/r0eXpeR/CVE-2021-22205
#CVE-2021-22205& GitLab CE/EE RCE
https://github.com/Al1ex/CVE-2021-22205