Aiven-Open / pghostile
Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can be used to identify security issues in PostgreSQL extensions, to test system hardening and for security research in general.
☆10Updated last year
Related projects: ⓘ
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated last year
- Burp extension for automated handling of CSRF tokens☆15Updated 6 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 6 years ago
- Repository for proxenet plugins☆14Updated 8 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 7 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- Extract, defang, resolve names and IPs from text☆22Updated 8 months ago
- masscan result parsing, web server fingerprinting☆19Updated 2 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- CloudFlare Worker Shell☆13Updated 4 years ago
- Phishing Toolkit☆19Updated 6 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆16Updated 4 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Updated 5 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- NMAP NSE that enumerates VNC authentication types☆14Updated 13 years ago
- Ansible scripts to build an attack box☆22Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- ☆10Updated this week
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆32Updated 5 years ago
- RSYaba Modular Brute Force Attacker☆19Updated 10 years ago
- Data EXfiltration TestER☆20Updated 5 years ago
- ☆10Updated this week
- ☆14Updated last year
- Network based steganography based control channels and chat.☆8Updated 8 years ago