Aiven-Open / pghostileLinks
Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can be used to identify security issues in PostgreSQL extensions, to test system hardening and for security research in general.
☆11Updated 2 years ago
Alternatives and similar repositories for pghostile
Users that are interested in pghostile are comparing it to the libraries listed below
Sorting:
- Application Hijack Scanner for macOS☆71Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Updated 3 years ago
- A Linux RAT in C☆33Updated 7 years ago
- a parser + crawler for .DS_Store files exposed publically☆56Updated 2 years ago
- #INFILTRATE19 raptor's party pack.☆33Updated 2 months ago
- A program to map out SPF and DKIM records for a large number of domains☆39Updated 10 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- ☆15Updated 5 years ago
- Very loud vBulletin exploit☆14Updated 5 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- ☆11Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 3 years ago
- All the information provided on this site is for educational purposes only.☆18Updated last year
- Periodically check hashcat cracking progress and notify of success.☆10Updated 7 years ago
- Working exploit code for CVE-2019-17625☆19Updated 5 years ago
- the Open Source Windows Privilege Escalation Guide☆10Updated 8 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 5 years ago
- Encode binary as English text over HTTP(s)☆30Updated 2 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Automated install process for Phishing Frenzy☆24Updated 11 years ago
- Assists in mass exportation of Nessus scans☆20Updated 7 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- Collection of nmap nse scripts☆23Updated 6 years ago
- Template repo for Conjur repositories☆17Updated 2 months ago
- Experimenting with destructive file attacks in Go☆19Updated 6 years ago
- ☆15Updated 4 years ago