Silky's repositories
CVE-2020-11107
This is a writeup for CVE-2020-11107 reported by Maximilian Barz
Suidsploit
A Tool which can exploit 137 files from GTFO-Bins automaticlly
Auto_wpscan
A little bash script to automaticlly enumerate wordpress Users and Wordpress Vulnerabillities
Sick-Os-1.2-Remote-Root-Exploit
https://www.youtube.com/watch?v=bpbSdgK0SfE
Zabbix-AutoExploiter
Zabbix 2.2 < 3.0.3 - API JSON-RPC Remote Code Execution Exploit Tool which allows to add a new SuperAdmin User via the zabbix API and theire default creds. Including a Tool to execute a low PrivShell
Compile-C-to-Wasm-
Compile C to Wasm and display an Image in the Browser
DC-5-boot2root-exploit
roots after it boots :D
Instagrambot-ID-Converter
Program which converts converts Usernames to its IDs, also including an Instagrambot which automaticly follows and unfollows per Instagram IDs ..... Credits to linux_choice
nmapAutomator
A script that you can run in the background!
kioptrix-2-Boot2Root-Exploit
Does what its name says
nmap-vulners
NSE script based on Vulners.com API
pgadmin4-decryptor
decrypts pgadmin4 user hashes
remote-bufferoverflow-exploit-template
The first one is a simple Remote bufferoverflow Exploit Template. The Second one is a remote return 2 LiBC(through SSH) Exploit Template
bluekeep_CVE-2019-0708_poc_to_exploit
Porting BlueKeep PoC from @Ekultek to actual exploits
CVE-2019-0708
CVE-2019-0708 - BlueKeep (RDP)
d34d_d0lph1n-exploit
Modyfied Bluekeep DOS - Obfuscated to prevent abuse
linuxprivchecker
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
PrintSpoofer
Abusing Impersonation Privileges on Windows 10 and Server 2019
SweetPotato
Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019