CODE WHITE GmbH (codewhitesec)

CODE WHITE GmbH

codewhitesec

Organization data from Github https://github.com/codewhitesec

CODE WHITE - FINEST HACKING

Location:Germany

Home Page:https://code-white.com

GitHub:@codewhitesec

Twitter:@codewhitesec

CODE WHITE GmbH's repositories

HandleKatz

PIC lsass dumper using cloned handles

LethalHTA

Lateral Movement technique using DCOM and HTA

Language:C#License:MITStargazers:235Issues:10Issues:0

Lastenzug

Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level

ColdFusionPwn

Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11/12

Language:JavaLicense:MITStargazers:95Issues:5Issues:5

HttpRemotingObjRefLeak

Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)

Language:PythonLicense:MITStargazers:91Issues:0Issues:1

UnmarshalPwn

POC for CVE-2018-0824

NewRemotingTricks

New exploitation tricks for hardened .NET Remoting servers

Language:C#License:MITStargazers:27Issues:0Issues:0

apollon

Proof-of-Concept to evade auditd by writing /proc/PID/mem

Language:C#License:GPL-3.0Stargazers:20Issues:0Issues:0

daphne

Proof-of-Concept to evade auditd by tampering via ptrace

Language:CStargazers:18Issues:1Issues:0

qubes-keepass

rofi based frontend for KeePassXC running on Qubes OS

sap-p4-java-deserialization-exploit

Exploit for SAP P4 Java Deserialization (http://codewhitesec.blogspot.com/2017/05/sap-customers-make-sure-your-sapjvm-is.html)

Language:PythonStargazers:6Issues:0Issues:1
Language:CStargazers:3Issues:0Issues:0

ExploitRemotingService

A tool to exploit .NET Remoting Services

Language:C#License:GPL-3.0Stargazers:3Issues:0Issues:0

qubes-yubioath

rofi based frontend for OTP related functionality of yubikey-manager running on Qubes OS

Language:PythonStargazers:2Issues:1Issues:0

ysoserial.net

Deserialization payload generator for a variety of .NET formatters

Language:C#License:MITStargazers:0Issues:0Issues:0