Pinned Repositories
Bughound
Static code analysis tool based on Elasticsearch
CVE-2020-8813
The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813
DNSStager
Hide your payload in DNS
ExchangeFinder
Find Microsoft Exchange instance for a given domain and identify the exact version
Octopus
Open source pre-operation C2 server based on python and powershell
RCEScanner
Simple python script to extract unsafe functions from php projects
Shellcode-In-Memory-Decoder
A simple C implementation to decoded your shellcode and writes it directly to memory
shellcode-process-injection
Simple C implementation to perform shellcode process injection via win32 APIs
XMLDecoder-payload-generator
A simple python script to generate XML payloads works for XMLDecoder based on ProcessBuilder and Runtime exec
XSSRadare
A Cross Site Scripting scanner using selenium webdriver
mhaskar's Repositories
mhaskar/Octopus
Open source pre-operation C2 server based on python and powershell
mhaskar/DNSStager
Hide your payload in DNS
mhaskar/ExchangeFinder
Find Microsoft Exchange instance for a given domain and identify the exact version
mhaskar/XMLDecoder-payload-generator
A simple python script to generate XML payloads works for XMLDecoder based on ProcessBuilder and Runtime exec
mhaskar/Bughound
Static code analysis tool based on Elasticsearch
mhaskar/Shellcode-In-Memory-Decoder
A simple C implementation to decoded your shellcode and writes it directly to memory
mhaskar/CVE-2020-8813
The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813
mhaskar/shellcode-process-injection
Simple C implementation to perform shellcode process injection via win32 APIs
mhaskar/XSSRadare
A Cross Site Scripting scanner using selenium webdriver
mhaskar/DNSKeyGen
A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.
mhaskar/MalleableC2-Profiles
A collection of Cobalt Strike Malleable C2 profiles
mhaskar/Octopus-C2-RedTeam-infrastructure-automation
mhaskar/CVE-2020-14947
The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947
mhaskar/CVE-2020-12078
The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078
mhaskar/CVE-2019-20224
The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224
mhaskar/CVE-2019-16662
The official exploit for rConfig 3.9.2 Pre-auth Remote Code Execution CVE-2019-16662
mhaskar/CVE-2024-11320
Exploit for Pandora FMS Remote Code Execution CVE-2024-11320
mhaskar/CVE-2019-16663
The official exploit for rConfig 3.9.2 Post-auth Remote Code Execution CVE-2019-16663
mhaskar/CVE-2023-0315
The official exploit for Froxlor Remote Code Execution CVE-2023-0315
mhaskar/powershell-extractor-elasticsearch
Python script to extract powershell scrips from elasticsearch based on windows event "4104"
mhaskar/APT-Hunter
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
mhaskar/impacket
Impacket is a collection of Python classes for working with network protocols.
mhaskar/MicrosoftDCFTokenRequester
Simple and lazy script to request tokens from Microsoft using Device Code Flow
mhaskar/BOF_Collection
Various Cobalt Strike BOFs
mhaskar/shields
Concise, consistent, and legible badges in SVG and raster format
mhaskar/decode-spam-headers
A script that helps you understand why your E-Mail ended up in Spam
mhaskar/Leoid
b1twis3 Portfolio
mhaskar/Medusa
Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic
mhaskar/mhaskar
mhaskar/SharPyShell
SharPyShell - tiny and obfuscated ASP.NET webshell for C# web applications