Takes host-file, username-file, password-file, and command-file. Brute forces SSH credentials and on success runs commands.
-
Updated
Dec 28, 2023 - C
Takes host-file, username-file, password-file, and command-file. Brute forces SSH credentials and on success runs commands.
EternalHush - new free advanced open-source c2 framework
Vulnerability to execute a program from a memory overflow on Windows XP for 42 Madrid Cybersecurity Bootcamp.
Shellcode Encryption/Decryption using Windows CNG API
A tool used to clear Windows Event Logs without invoking wevtutil
Process name faker for linux/BSD/Unix
ARM 32-bit Raspberry Pi Hacking Float example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Char example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Double example in Kali Linux.
a stage1 DLL loader with sleep obfuscation
User/Kernel Mode communication using IOCTL
ARM 32-bit Raspberry Pi Char Pointer example in Kali Linux.
Data EXfiltration TestER
A collection of PoCs for different injection techniques on Windows!
Add a description, image, and links to the red-team topic page so that developers can more easily learn about it.
To associate your repository with the red-team topic, visit your repo's landing page and select "manage topics."