Aiven-Open / pghostileLinks
Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can be used to identify security issues in PostgreSQL extensions, to test system hardening and for security research in general.
☆11Updated 2 years ago
Alternatives and similar repositories for pghostile
Users that are interested in pghostile are comparing it to the libraries listed below
Sorting:
- #INFILTRATE19 raptor's party pack.☆32Updated last month
- Rex library for various exploitation helpers☆22Updated 2 months ago
- This repository holds interesting bits and pieces related to research I performed on wireless presentation devices manufactured by Awindi…☆13Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- Very loud vBulletin exploit☆14Updated 5 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 11 months ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Zone transfers for rwhois☆20Updated 6 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- Decrypt encrypted SonicOSX firmware images☆20Updated 9 months ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Updated last year
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 7 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 5 years ago
- ☆38Updated 5 years ago
- Check for .net padding oracle patch☆19Updated 7 years ago
- various slides and presentations I've worked on☆19Updated 8 months ago
- Sources Codes of many Office Malwares☆17Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- ☆12Updated 2 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 6 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- yet another dirbuster☆18Updated 4 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- Screenshot Shenanigans☆26Updated 8 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 5 years ago
- ☆17Updated 2 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Updated 5 years ago
- Application Hijack Scanner for macOS☆71Updated 4 years ago