Pinned Repositories
-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server
This vulnerability allows an unauthenticated attacker to remotely execute arbitrary code on a vulnerable Confluence server. The vulnerability exists due to an improper validation of user-supplied input in the Confluence REST API. This allows an attacker to inject malicious code into the Confluence server, which can then be executed by the server
-shell
Msmap is a Memory WebShell Generator.
360tianqingRCE
捕获攻击队0day 360tianqingRCE
AMON-Eye
cve-2024-6387-pocx
Freeze-EDRBypass
Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
Nimcrypt2
.NET, PE, & Raw Shellcode Packer/Loader Written in Nim
SMBploit
Offensive tool to scan & exploit vulnerabilities in Microsoft Windows over the Samba protocol (SMB) SMBv1/SMBv2 using the Metasploit Framework
thanatos
Mythic C2 agent targeting Linux and Windows hosts written in Rust
x2Ldr
nim免杀过某数字、某绒
r00t7oo2jm's Repositories
r00t7oo2jm/SMBploit
Offensive tool to scan & exploit vulnerabilities in Microsoft Windows over the Samba protocol (SMB) SMBv1/SMBv2 using the Metasploit Framework
r00t7oo2jm/AMON-Eye
r00t7oo2jm/Freeze-EDRBypass
Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
r00t7oo2jm/thanatos
Mythic C2 agent targeting Linux and Windows hosts written in Rust
r00t7oo2jm/x2Ldr
nim免杀过某数字、某绒
r00t7oo2jm/a-sheep-assistant
羊了个羊助手,羊了个羊一键闯关,请勿将本项目的任何内容用于商业或非法目的,否则后果自负
r00t7oo2jm/AM0N-Eye
r00t7oo2jm/Bundler-bypass
免杀捆绑器,过主流杀软。A Bundler bypass anti-virus
r00t7oo2jm/Burp2Malleable
Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles
r00t7oo2jm/BypassPro
对权限绕过自动化bypass的burpsuite插件
r00t7oo2jm/CVE-2022-27925-PoC
Zimbra RCE simple poc
r00t7oo2jm/CVE-2022-40684-RCE-POC
CVE-2022-40684-RCE-POC Fortinet Vulnerability
r00t7oo2jm/cve-2022-41352-zimbra-rce
Zimbra <9.0.0.p27 RCE
r00t7oo2jm/CVE-2023-21554
r00t7oo2jm/CVE-2024-20931
The Poc for CVE-2024-20931
r00t7oo2jm/DLLirant
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
r00t7oo2jm/env
test
r00t7oo2jm/goby-poc
439个goby poc,可能会有重复自行判断,来源于网络收集的Goby&POC,实时更新。
r00t7oo2jm/GraphStrike
Cobalt Strike HTTPS beaconing over Microsoft Graph API
r00t7oo2jm/Payload-Generator
An aggressor script that can help automate payload building in Cobalt Strike
r00t7oo2jm/r00t7oo2jm.github.io
Blog
r00t7oo2jm/r77-rootkit
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
r00t7oo2jm/ShellGhost
A memory-based evasion technique which makes shellcode invisible from process start to end.
r00t7oo2jm/SilentCryptoMiner
A Silent (Hidden) Free Crypto Miner Builder - Supports ETH, ETC, XMR and many more.
r00t7oo2jm/Talon
(Demo) 3rd party agent for Havoc
r00t7oo2jm/TeamFiltration
r00t7oo2jm/TerraLdr
A Payload Loader Designed With Advanced Evasion Features
r00t7oo2jm/Villain
Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machines running Villain) and share their backdoor sessions, handy for working as a team.
r00t7oo2jm/xencrypt
A PowerShell script anti-virus evasion tool
r00t7oo2jm/YongyouNC-Unserialize-Tools
用友NC反序列化漏洞payload生成