Aiven-Open / pghostile
Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can be used to identify security issues in PostgreSQL extensions, to test system hardening and for security research in general.
☆11Updated last year
Alternatives and similar repositories for pghostile:
Users that are interested in pghostile are comparing it to the libraries listed below
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- Download a Bunch of Malware for Demos and Testing☆13Updated 6 years ago
- Some Pentesting Scripts☆10Updated 3 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆31Updated 3 years ago
- ZAP plugin demonstrating custom view for WebSocket messages.☆13Updated 2 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- mud-visualizer is a tool to visualize MUD files☆9Updated 2 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- CloudFlare Worker Shell☆13Updated 4 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- A wrapper around jq, to help you parse jq output!☆30Updated 4 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- Eddie Vetter - triage macOS applications for security research☆16Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Updated 3 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Keyhack - Golang API token/webhook validator☆16Updated 5 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- A command-line application to generate random user agent strings.☆17Updated 4 years ago