Found 8,271 repositories(showing 30)
gelstudios
abusing github commit history for the lulz
samyk
Produces persistent, respawning "super" cookies in a browser, abusing over a dozen techniques. Its goal is to identify users after they've removed standard cookies and other privacy data such as Flash cookies (LSOs), HTML5 storage, SilverLight storage, and others.
PHP client library for reCAPTCHA, a free service to protect your website from spam and abuse.
ly4k
Tool for Active Directory Certificate Services enumeration and abuse
t3l3machus
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
sensepost
A tool to abuse Exchange services
itm4n
Abusing impersonation privileges through the "Printer Bug"
UnaPibaGeek
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
GhostPack
Active Directory certificate abuse.
dirkjanm
Kerberos relaying and unconstrained delegation abuse toolkit
anttiviljami
A simple demo of phishing by abusing the browser autofill feature
SHANMUGAM070106
[Support 0.48.x](Reset Cursor AI MachineID & Auto Sign Up / In & Bypass Higher Token Limit)自动注册 Cursor Ai ,自动重置机器ID , 免费升级使用Pro功能: You've reached your trial request limit. / Too many free trial accounts used on this machine. Please upgrade to pro. We have this limit in place to prevent abuse. Please let us know if you believe this is a mistake.
SafeBreach-Labs
A set of fully-undetectable process injection techniques abusing Windows Thread Pools
dirkjanm
Exchange your privileges for Domain Admin privs by abusing Exchange
matthieu-hackwitharts
Win32 and Kernel abusing techniques for pentesters
iangcarroll
🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.
mxrch
🐧 Abuse of Google Colab for cracking hashes.
t-davidson
Repository for the paper "Automated Hate Speech Detection and the Problem of Offensive Language", ICWSM 2017
nongiach
[Linux] Two Privilege Escalation techniques abusing sudo token
D4stiny
A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.
Nikitosshow
You've reached your trial request limit. / Too many free trial accounts used on this machine. Please upgrade to pro. We have this limit in place to prevent abuse. Please let us know if you believe this is a mistake.
deepinstinct
A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.html#dirty-vanity-a-new-approach-to-code-injection--edr-bypass-28417
ShutdownRepo
Kerberoast with ACL abuse capabilities
Kudaes
UAC bypass by abusing RPC and debug objects.
noob-hackers
All In 1 Spam Tool For Termux Users Subscribe Us (Noob Hackers) some shit heads are trying to abuse this script so don't worry about them ...let them hallucinate ...but you are free to use this script
jkctech
Proof of concept for abusing Telegram's "People Near Me" feature and tracking people's location
RalfHacker
BOF for Kerberos abuse (an implementation of some important features of the Rubeus).
wh0amitz
UAC Bypass By Abusing Kerberos Tickets
sensepost
Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.
Dec0ne
A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other objects in the domain.