Aiven-Open / pghostileLinks
Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can be used to identify security issues in PostgreSQL extensions, to test system hardening and for security research in general.
☆11Updated 2 years ago
Alternatives and similar repositories for pghostile
Users that are interested in pghostile are comparing it to the libraries listed below
Sorting:
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- ☆15Updated 5 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 5 years ago
- ☆21Updated 6 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- a parser + crawler for .DS_Store files exposed publically☆56Updated 2 years ago
- Application Hijack Scanner for macOS☆71Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 7 years ago
- #INFILTRATE19 raptor's party pack.☆33Updated 3 months ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Updated 3 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- ☆18Updated 7 years ago
- Exactly what it sounds like, which is something rad☆22Updated 3 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Automated install process for Phishing Frenzy☆24Updated 11 years ago
- the Open Source Windows Privilege Escalation Guide☆10Updated 8 years ago
- ☆38Updated 5 years ago
- ☆15Updated 4 years ago
- Check for .net padding oracle patch☆19Updated 7 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated last year
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 6 years ago
- Very loud vBulletin exploit☆14Updated 5 years ago
- Experimenting with destructive file attacks in Go☆19Updated 6 years ago
- Encode binary as English text over HTTP(s)☆30Updated 2 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Updated last year
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago