Pinned Repositories
-CVE-2017-9805
Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805)
CVE-2016-2098
Ruby On Rails unrestricted render() exploit
CVE-2018-1000001
glibc getcwd() local privilege escalation compiled binaries
CVE-2018-10517
CMS Made Simple 2.2.7 RCE exploit
CVE-2018-12613
PHPMyAdmin v4.8.0 and v.4.8.1 LFI exploit
CVE-2019-0841-BYPASS
A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.
FakePip
Pip install exploit package
Shellkiller
A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.
ShellPop
Pop shells like a master.
TelePreter
Telegram-based PowerShell Runspace Host
0x00-0x00's Repositories
0x00-0x00/-CVE-2017-9805
Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805)
0x00-0x00/TelePreter
Telegram-based PowerShell Runspace Host
0x00-0x00/0x00-0x00.github.io
0x00-0x00/jaeles
The Swiss Army knife for automated Web Application Testing
0x00-0x00/KrbRelayUp
KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
0x00-0x00/PPLKiller
Tool to bypass LSA Protection (aka Protected Process Light)
0x00-0x00/pybackdoor
poc backdoor using python and threading
0x00-0x00/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
0x00-0x00/beef
The Browser Exploitation Framework Project
0x00-0x00/Blackbone
Windows memory hacking library
0x00-0x00/bypass-clm
PowerShell Constrained Language Mode Bypass
0x00-0x00/CVE-2021-21551
Exploit to SYSTEM for CVE-2021-21551
0x00-0x00/CVE-2021-21972
Proof of Concept Exploit for vCenter CVE-2021-21972
0x00-0x00/CVE-2021-36934
C# PoC for CVE-2021-36934/HiveNightmare/SeriousSAM
0x00-0x00/CVE-2021-40444
CVE-2021-40444 PoC
0x00-0x00/CVE-Exploits
PoCs for public CVE's I have been working on.
0x00-0x00/doomcaptcha
Captchas don't have to be boring
0x00-0x00/go-chromecast
cli for Google Chromecast, Home devices and Cast Groups
0x00-0x00/grocy
ERP beyond your fridge - grocy is a web-based self-hosted groceries & household management solution for your home
0x00-0x00/HTTP-revshell
Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware
0x00-0x00/httprobe
Take a list of domains and probe for working HTTP and HTTPS servers
0x00-0x00/jaeles-signatures
Default signature for Jaeles Scanner
0x00-0x00/juicy_2
juicypotato for win10 > 1803 & win server 2019
0x00-0x00/pe_to_shellcode
Converts PE into a shellcode
0x00-0x00/PrintNightmare
0x00-0x00/RemotePotato0
Just another "Won't Fix" Windows Privilege Escalation from User to Domain Admin.
0x00-0x00/sRDI
Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode
0x00-0x00/TranslationRO_PT-BR
Tradução de arquivos do Ragnarok para o PTBR server-side e client-side. A server-side and client-side translation for Ragnarok to Brazilian Portuguese
0x00-0x00/VECTR
VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities across different attack scenarios
0x00-0x00/viper
Go configuration with fangs