payload
Here are 36 public repositories matching this topic...
Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
-
Updated
May 15, 2021 - C
PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)
-
Updated
Jul 5, 2024 - C
Whatsapp Automatic Payload Generator [CVE-2019-11932]
-
Updated
Jan 2, 2022 - C
Construct a payload at runtime using an array of offsets
-
Updated
Jun 19, 2024 - C
ADR is a trojan that retrieves all information on the computer and all data stored in applications using chormuim. It recovers cookies, tokens, passwords and saved bank cards. This malware is undetectable by Windows Defender, Chrome, Virustotal (4/71).
-
Updated
Sep 5, 2023 - C
A collection of code examples e.g. a buffer overflow + exploit, crypter, shellcodes and more.
-
Updated
Apr 5, 2024 - C
This repo hosts basic win32 compatible and visual studio C based shell code for an article on analysis
-
Updated
Jun 14, 2020 - C
HeadHunter Command and Control (C2) Framework
-
Updated
Jan 8, 2024 - C
Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for security professionals and enthusiasts.
-
Updated
Mar 13, 2024 - C
DirtyPipe: Exploit for a new Linux vulnerability known as 'Dirty Pipe(CVE-2022-0847)' allows local users to gain root privileges. The vulnerability is tracked as CVE-2022-0847 and allows a non-privileged user to inject and overwrite data in read-only files, including SUID processes that run as root.
-
Updated
Apr 2, 2022 - C
Improve this page
Add a description, image, and links to the payload topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the payload topic, visit your repo's landing page and select "manage topics."