Pinned Repositories
google-scraper
[Python] Google Scraper & Mass Exploiter
joomla-sqli-mass-exploit
Joomla 3.2 to 3.4.4 Remote SQL Injection Mass Exploit
needle
A multiprocessing blind SQL injection script to handle cases where sqlmap fails.
root-exploiter-php-cpp
[PHP][C++] Root Exploiter – No Back-Connect
root-exploiter-php-python
[PHP][Python] Root Exploiter – No Back-Connect
sync-security-group-with-cloudflare-ip-addresses
Lambda function to sync AWS Security Group with Cloudflare IP addresses
vBulletin-5.1.x-PreAuth-RCE
[Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution
WeChall
[Wechall.net] Solutions of different challenges.
wordpress-real-3d-flipbook-exploit
[POC][Exploit] CodeCanyon Real3D FlipBook WordPress Plugin
mukarramkhalid's Repositories
mukarramkhalid/backdoo-rs
A simple Meterpreter stager written in Rust.
mukarramkhalid/C2_INFRA_WORKSHOP_DEFCON32_RED_TEAM_VILLAGE
C2 Infrastructure Automation
mukarramkhalid/clroxide
A rust library that allows you to host the CLR and execute dotnet binaries.
mukarramkhalid/cnext-exploits
Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()
mukarramkhalid/DeadPotato
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the original GodPotato source code by BeichenDream.
mukarramkhalid/disable-flutter-tls-verification
A Frida script that disables Flutter's TLS verification
mukarramkhalid/DojoLoader
Generic PE loader for fast prototyping evasion techniques
mukarramkhalid/enumhandles_BOF
mukarramkhalid/EXE-or-DLL-or-ShellCode
Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...
mukarramkhalid/File-Tunnel
Tunnel TCP connections through a file
mukarramkhalid/hackshell
Make BASH stealthy and hacker friendly with lots of bash functions
mukarramkhalid/hookchain
HookChain: A new perspective for Bypassing EDR Solutions
mukarramkhalid/InternalAllTheThings
Active Directory and Internal Pentest Cheatsheets
mukarramkhalid/L1B3RT45
JAILBREAK PROMPTS FOR ALL MAJOR AI MODELS
mukarramkhalid/LeakedWallpaper
Leak of any user's NetNTLM hash. Fixed in KB5040434
mukarramkhalid/Lifetime-Amsi-EtwPatch
Two in one, patch lifetime powershell console, no more etw and amsi!
mukarramkhalid/Lifetime-AmsiBypass
Lifetime AMSI bypass.
mukarramkhalid/NimPlant
A light-weight first-stage C2 implant written in Nim.
mukarramkhalid/No-Consolation
A BOF that runs unmanaged PEs inline
mukarramkhalid/NyxInvoke
NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features.
mukarramkhalid/obj2shellcode
shellcode生成框架
mukarramkhalid/pinkary.com
Create a landing page for all your links and connect with like-minded people without the noise.
mukarramkhalid/RemoteKrbRelay
Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework
mukarramkhalid/shadow-rs
Windows Kernel Rootkit in Rust
mukarramkhalid/Shellcode-Loader
This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.
mukarramkhalid/SilentMoonwalk
PoC Implementation of a fully dynamic call stack spoofer
mukarramkhalid/Tempest
A command and control framework written in rust.
mukarramkhalid/tryharder
C++ Staged Shellcode Loader with Evasion capabilities.
mukarramkhalid/Villain
Villain is a high level stage 0/1 C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
mukarramkhalid/windows-api-function-cheatsheets
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization, interprocess communication, Unicode string manipulation, error handling, Winsock networking operations, and registry operations.