Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can be used to identify security issues in PostgreSQL extensions, to test system hardening and for security research in general.
☆11Aug 17, 2023Updated 2 years ago
Alternatives and similar repositories for pghostile
Users that are interested in pghostile are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Jul 4, 2020Updated 5 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Rack handler for unicorn meant to be used with `rails server`☆20Mar 30, 2012Updated 13 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Nov 21, 2021Updated 4 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- Decruft those Rails filters☆19Mar 18, 2015Updated 11 years ago
- A PHP web micro-framework inspired by Ruby's Sinatra☆26Jan 12, 2015Updated 11 years ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Sep 20, 2023Updated 2 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Spreading joy and love☆61Oct 5, 2022Updated 3 years ago
- Nexus of Android banking Trojans☆15Oct 11, 2023Updated 2 years ago
- Send HTTP scrapers to Wonderland☆24Jan 7, 2019Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument …☆27Feb 15, 2024Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Leonardo-Arduino script and python keylogger for BAD-USB aka Poor Man's RUBBER-DUCKY☆12Aug 14, 2020Updated 5 years ago
- A configuration tool for virtual domain email for Postfix and Dovecot☆16May 15, 2016Updated 9 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- An attempt at a framework to automate metasploit by making the machine learning modules as plug and play packages. Alpha software and sti…☆13Jan 31, 2019Updated 7 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Nov 10, 2025Updated 4 months ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Pegasus System has been designed by an experienced team of software developers (terkoding) and exploit writers to automate processes so p…☆16Jan 2, 2019Updated 7 years ago
- Execute a string of JavaScript using Node.js and return the global variable values and functions.☆12Apr 17, 2025Updated 11 months ago
- Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking…☆11Aug 23, 2020Updated 5 years ago