huongAT's repositories
adventofcode-2015
Advent of Code 2015 puzzles and solutions
bash2048
Bash implementation of 2048 game
bug-bounty-reference
Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature
CVE-2017-12615
POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.
CVE-2017-8759
Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.
dnssearch
A subdomain enumeration tool.
DropboxC2C
DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.
EmpireDog
A collection of PowerShell Modules for BloodHound/Empire Orchestration
exploit-CVE-2017-7494
SambaCry exploit and vulnerable container (CVE-2017-7494)
Fingerprinter
CMS/LMS/Library etc Versions Fingerprinter
frp
A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.
Hijacker
Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android
ivre
Network recon framework.
linux-exploit-suggester
Linux privilege escalation auditing tool
PoCSubjectInterfacePackage
A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.
portia
Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised.
RAT-via-Telegram
Windows Remote Administration Tool via Telegram
SSRF-Testing
SSRF (Server Side Request Forgery) testing resources
the-art-of-command-line
Master the command line, in one page
vlany
Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)
Vulnerable-OTP-Application
Vulnerable OTP/2FA Application written in PHP using Google Authenticator
Win10PostExploits
post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..