Silky (S1lkys)

S1lkys

Geek Repo

Location:Germany

Twitter:@S1lky_1337

Github PK Tool:Github PK Tool

Silky's repositories

CVE-2020-11107

This is a writeup for CVE-2020-11107 reported by Maximilian Barz

Auto_LFI

A simple Script which tests for LFI (Local File Inclusion) via Curl

Language:ShellStargazers:18Issues:2Issues:0

Suidsploit

A Tool which can exploit 137 files from GTFO-Bins automaticlly

Language:ShellStargazers:13Issues:2Issues:0

Auto_wpscan

A little bash script to automaticlly enumerate wordpress Users and Wordpress Vulnerabillities

Language:ShellStargazers:6Issues:1Issues:0

Silcrypt

A Simple python Ransomware

Language:PythonStargazers:5Issues:1Issues:0

helios

An Rce Exploit through Maillog poisioning + a local file inclusion for the symfonos machine on vulnhub

Language:PythonStargazers:4Issues:3Issues:0

Sick-Os-1.2-Remote-Root-Exploit

https://www.youtube.com/watch?v=bpbSdgK0SfE

Language:PythonStargazers:3Issues:2Issues:0

Zabbix-AutoExploiter

Zabbix 2.2 < 3.0.3 - API JSON-RPC Remote Code Execution Exploit Tool which allows to add a new SuperAdmin User via the zabbix API and theire default creds. Including a Tool to execute a low PrivShell

Language:PythonStargazers:3Issues:1Issues:0

Auto_Steg

A simple Bash program which bruteorces JPG-Files with Steghide

Language:ShellStargazers:2Issues:1Issues:0

Compile-C-to-Wasm-

Compile C to Wasm and display an Image in the Browser

DC-5-boot2root-exploit

roots after it boots :D

Language:PythonStargazers:2Issues:2Issues:0

Instagrambot-ID-Converter

Program which converts converts Usernames to its IDs, also including an Instagrambot which automaticly follows and unfollows per Instagram IDs ..... Credits to linux_choice

Language:PythonStargazers:2Issues:1Issues:0

nmapAutomator

A script that you can run in the background!

Language:ShellStargazers:2Issues:1Issues:0

kioptrix-2-Boot2Root-Exploit

Does what its name says

Language:PythonStargazers:1Issues:1Issues:0

nmap-vulners

NSE script based on Vulners.com API

Language:LuaLicense:GPL-3.0Stargazers:1Issues:1Issues:0

pgadmin4-decryptor

decrypts pgadmin4 user hashes

Language:PythonStargazers:1Issues:1Issues:0

remote-bufferoverflow-exploit-template

The first one is a simple Remote bufferoverflow Exploit Template. The Second one is a remote return 2 LiBC(through SSH) Exploit Template

Language:PythonStargazers:1Issues:2Issues:0

Silk

Linux Rootkit for Post-Exploitation

Language:ShellStargazers:1Issues:2Issues:0

bluekeep_CVE-2019-0708_poc_to_exploit

Porting BlueKeep PoC from @Ekultek to actual exploits

Language:PythonLicense:GPL-3.0Stargazers:0Issues:0Issues:0

CVE-2019-0708

CVE-2019-0708 - BlueKeep (RDP)

Language:PythonStargazers:0Issues:1Issues:0

d34d_d0lph1n-exploit

Modyfied Bluekeep DOS - Obfuscated to prevent abuse

Language:PythonStargazers:0Issues:1Issues:1

Ghostcat

CVE-2020-1938 exploit

Stargazers:0Issues:1Issues:0

linuxprivchecker

linuxprivchecker.py -- a Linux Privilege Escalation Check Script

Language:PythonStargazers:0Issues:0Issues:0
Language:ShellStargazers:0Issues:1Issues:0
Language:PHPLicense:GPL-2.0Stargazers:0Issues:1Issues:0

PrintSpoofer

Abusing Impersonation Privileges on Windows 10 and Server 2019

Language:CStargazers:0Issues:1Issues:0
Language:CStargazers:0Issues:1Issues:0

SweetPotato

Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019

Language:C#Stargazers:0Issues:1Issues:0