GithubHelp home page GithubHelp logo

Bahadır TEMİZER's Projects

rekono icon rekono

Execute full pentesting processes combining multiple hacking tools automatically

rhaegal icon rhaegal

Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect suspicious/malicious logs

rms-runtime-mobile-security icon rms-runtime-mobile-security

Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime

rsg icon rsg

ReverShellGenerator - A tool to generate various ways to do a reverse shell

rustredops icon rustredops

🦀 | RustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language

sam-the-admin icon sam-the-admin

Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user

sap_exploit icon sap_exploit

Here you can get full exploit for SAP NetWeaver AS JAVA

scarecrow icon scarecrow

ScareCrow - Payload creation framework designed around EDR bypass.

serpentine icon serpentine

Windows RAT (Remote Administration Tool) with a multiplatform RESTful C2 server

sharpkiller icon sharpkiller

Lifetime AMSI bypass by @ZeroMemoryEx ported to .NET Framework 4.8

siet icon siet

Smart Install Exploitation Tool

silenttrinity icon silenttrinity

An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR

smbclient-ng icon smbclient-ng

smbclient-ng, a fast and user friendly way to interact with SMB shares.

smbmap icon smbmap

SMBMap is a handy SMB enumeration tool

solarflare icon solarflare

SolarWinds Orion Account Audit / Password Dumping Utility

sourcewolf icon sourcewolf

Amazingly fast response crawler to find juicy stuff in the source code! 😎🔥

sparrow icon sparrow

Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.

sudo_killer icon sudo_killer

A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo

takeover.sh icon takeover.sh

Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.

the-backdoor-factory icon the-backdoor-factory

Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors

the-hacker-recipes icon the-hacker-recipes

This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, intelligence gathering, physical intrusion, phishing, mobile apps, iot, social engineering, etc.

top icon top

TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.