Askar (mhaskar)

mhaskar

Geek Repo

Location:Between Lines

Home Page:https://shells.systems

Twitter:@mohammadaskar2

Github PK Tool:Github PK Tool

Askar's repositories

Octopus

Open source pre-operation C2 server based on python and powershell

Language:PythonLicense:GPL-3.0Stargazers:716Issues:40Issues:19

DNSStager

Hide your payload in DNS

Language:PythonLicense:GPL-3.0Stargazers:596Issues:13Issues:6

ExchangeFinder

Find Microsoft Exchange instance for a given domain and identify the exact version

Language:PythonLicense:GPL-3.0Stargazers:187Issues:4Issues:4

XMLDecoder-payload-generator

A simple python script to generate XML payloads works for XMLDecoder based on ProcessBuilder and Runtime exec

Language:PythonStargazers:147Issues:4Issues:0

Bughound

Static code analysis tool based on Elasticsearch

Language:PythonLicense:GPL-3.0Stargazers:128Issues:4Issues:4

Shellcode-In-Memory-Decoder

A simple C implementation to decoded your shellcode and writes it directly to memory

Language:CLicense:GPL-3.0Stargazers:94Issues:6Issues:3

CVE-2020-8813

The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813

shellcode-process-injection

Simple C implementation to perform shellcode process injection via win32 APIs

XSSRadare

A Cross Site Scripting scanner using selenium webdriver

DNSKeyGen

A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.

Language:PythonLicense:GPL-3.0Stargazers:35Issues:1Issues:0

MalleableC2-Profiles

A collection of Cobalt Strike Malleable C2 profiles

CVE-2020-12078

The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078

Language:PythonStargazers:19Issues:1Issues:0

CVE-2020-14947

The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947

CVE-2019-20224

The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224

Language:PythonStargazers:15Issues:3Issues:0

CVE-2019-16662

The official exploit for rConfig 3.9.2 Pre-auth Remote Code Execution CVE-2019-16662

Language:PythonStargazers:13Issues:2Issues:0

CVE-2019-15029

The official exploit code for FusionPBX v4.4.8 Remote Code Execution CVE-2019-15029

Language:RubyStargazers:8Issues:2Issues:0

CVE-2019-16663

The official exploit for rConfig 3.9.2 Post-auth Remote Code Execution CVE-2019-16663

Language:PythonStargazers:7Issues:2Issues:0

CVE-2023-0315

The official exploit for Froxlor Remote Code Execution CVE-2023-0315

Language:PythonStargazers:5Issues:1Issues:0

powershell-extractor-elasticsearch

Python script to extract powershell scrips from elasticsearch based on windows event "4104"

Language:PythonLicense:GPL-3.0Stargazers:5Issues:2Issues:0

APT-Hunter

APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity

Language:PythonLicense:GPL-3.0Stargazers:3Issues:1Issues:0

impacket

Impacket is a collection of Python classes for working with network protocols.

Language:PythonLicense:NOASSERTIONStargazers:2Issues:1Issues:0

BOF_Collection

Various Cobalt Strike BOFs

Language:CLicense:BSD-3-ClauseStargazers:1Issues:1Issues:0

MicrosoftDCFTokenRequester

Simple and lazy script to request tokens from Microsoft using Device Code Flow

Language:PythonStargazers:1Issues:0Issues:0

shields

Concise, consistent, and legible badges in SVG and raster format

Language:JavaScriptLicense:CC0-1.0Stargazers:1Issues:1Issues:0

decode-spam-headers

A script that helps you understand why your E-Mail ended up in Spam

Language:PythonLicense:MITStargazers:0Issues:1Issues:0

Leoid

b1twis3 Portfolio

Stargazers:0Issues:1Issues:0

Medusa

Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic

Stargazers:0Issues:0Issues:0
Stargazers:0Issues:2Issues:0

SharPyShell

SharPyShell - tiny and obfuscated ASP.NET webshell for C# web applications

Language:PythonLicense:GPL-3.0Stargazers:0Issues:0Issues:0