Skip to content
View l0veormiss's full-sized avatar

Block or report l0veormiss

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

ScareCrow - Payload creation framework designed around EDR bypass.

Go 2,792 511 Updated Aug 18, 2023

bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)

Python 526 167 Updated Jul 15, 2024

A fast, simple, recursive content discovery tool written in Rust.

Rust 6,297 521 Updated Mar 7, 2025

🤖 The Modern Port Scanner 🤖

Rust 15,879 1,079 Updated Mar 9, 2025

A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileg…

Shell 2,288 256 Updated Dec 28, 2024

Rustcat(rcat) - The modern Port listener and Reverse shell

Rust 749 63 Updated Jul 20, 2024

Automatic SSTI detection tool with interactive interface

Python 1 Updated Sep 14, 2023

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 1 Updated Sep 25, 2023

Monero: the secure, private, untraceable cryptocurrency

C++ 1 Updated Sep 27, 2023

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 11,328 1,365 Updated Oct 28, 2024

Automatic SSTI detection tool with interactive interface

Python 1,000 127 Updated Oct 14, 2024

This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.

3,365 629 Updated Feb 11, 2023

Generate a PNG with a payload embedded in the IDAT chunk (Based off of previous concepts and code -- credit in README)

Python 204 54 Updated Oct 4, 2023

Automatic SSRF fuzzer and exploitation tool

Python 1 Updated May 27, 2023

Automatic SSRF fuzzer and exploitation tool

Python 3,107 530 Updated Feb 26, 2025

Monero: the secure, private, untraceable cryptocurrency

C++ 9,300 3,184 Updated Feb 24, 2025

A remote control based on ICMP tunnel.

Python 6 3 Updated Oct 28, 2021

A lightweight proxy pool based on automated crawlers

Python 2 Updated Oct 28, 2021

My Blog

HTML 1 Updated Jul 1, 2022

Config files for my GitHub profile.

4 Updated Oct 29, 2023

Delete file regardless of whether the handle is used via SetFileInformationByHandle

41 2 Updated Jul 1, 2023

Linux下用于远程加载可执行文件以达到内存加载的目的

C 201 26 Updated Nov 9, 2022

dump lsass进程工具

C++ 1 Updated Jul 20, 2023

基于frp(0.44.0)二次开发,删除不必要功能,加密配置文件,修改流量以及文件特征

Go 313 41 Updated Aug 9, 2022

dump lsass进程工具

C++ 549 74 Updated Jul 20, 2023

Patches needed to build VMware (Player and Workstation) host modules against recent kernels

Makefile 1 Updated Sep 8, 2023

Patches needed to build VMware (Player and Workstation) host modules against recent kernels

Makefile 2,343 393 Updated Jul 13, 2024

Remote Administration Tool for Windows

C# 1 Updated Mar 12, 2023

Remote Administration Tool for Windows

C# 9,053 2,531 Updated Feb 29, 2024

Pre-Built Vulnerable Environments Based on Docker-Compose

Dockerfile 1 Updated Apr 8, 2023
Next