Takes host-file, username-file, password-file, and command-file. Brute forces SSH credentials and on success runs commands.
-
Updated
Dec 28, 2023 - C
Takes host-file, username-file, password-file, and command-file. Brute forces SSH credentials and on success runs commands.
Vulnerability to execute a program from a memory overflow on Windows XP for 42 Madrid Cybersecurity Bootcamp.
A tool used to clear Windows Event Logs without invoking wevtutil
Process name faker for linux/BSD/Unix
ARM 32-bit Raspberry Pi Hacking Double example in Kali Linux.
Shellcode Encryption/Decryption using Windows CNG API
ARM 32-bit Raspberry Pi Hacking Float example in Kali Linux.
ARM 32-bit Raspberry Pi Char Pointer example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Char example in Kali Linux.
EternalHush - new free advanced open-source c2 framework
User/Kernel Mode communication using IOCTL
ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.
Data EXfiltration TestER
a stage1 DLL loader with sleep obfuscation
Add a description, image, and links to the red-team topic page so that developers can more easily learn about it.
To associate your repository with the red-team topic, visit your repo's landing page and select "manage topics."