Aiven-Open / pghostileLinks
Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can be used to identify security issues in PostgreSQL extensions, to test system hardening and for security research in general.
☆11Updated 2 years ago
Alternatives and similar repositories for pghostile
Users that are interested in pghostile are comparing it to the libraries listed below
Sorting:
- ☆15Updated 4 years ago
- Very loud vBulletin exploit☆14Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 4 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- ☆17Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- ☆21Updated 5 years ago
- ☆12Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 5 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- a parser + crawler for .DS_Store files exposed publically☆54Updated 2 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Check for .net padding oracle patch☆19Updated 6 years ago
- the Open Source Windows Privilege Escalation Guide☆10Updated 8 years ago
- A Linux RAT in C☆35Updated 6 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 5 years ago
- Generic malicious browser check written in C#☆13Updated 9 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- Print the strings of encoded printable characters in files☆12Updated 10 years ago
- ☆15Updated 4 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- Assists in mass exportation of Nessus scans☆20Updated 7 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago