PRESTASHOP Modules Shell Exploit
☆11Sep 9, 2017Updated 8 years ago
Alternatives and similar repositories for PRESTA-modules-shell-exploit
Users that are interested in PRESTA-modules-shell-exploit are comparing it to the libraries listed below
Sorting:
- Wordpress AFD dl-skin.php Exploit☆16May 3, 2017Updated 8 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- Rubyesque interfaces and wrappers for Windows API functions defined using FFI☆26Nov 11, 2011Updated 14 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Run enigma2 application via SDL under Xvfb xserver in docker☆11Sep 4, 2024Updated last year
- Exploits for some of the vulnerabilities I have discovered☆19Aug 3, 2020Updated 5 years ago
- A tool used to dump the memory of a specific process on Android.☆14Feb 22, 2016Updated 10 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Create new Vala projects with ease☆12Aug 27, 2018Updated 7 years ago
- Simple software UART for AVR microcontrollers, written in assembly☆17Jan 18, 2018Updated 8 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- 一个简陋的 JavaScript 解释器实现. A simple JavaScript interpreter, build for beginners.☆12May 7, 2020Updated 5 years ago
- Collection of all the design assets related to Akira☆13Jan 15, 2023Updated 3 years ago
- Managing items for mediafire-grab.☆11Jun 16, 2022Updated 3 years ago
- 旋风寄生虫站群☆34Jun 22, 2016Updated 9 years ago
- A modern C++ HTML parser☆19Jul 8, 2020Updated 5 years ago
- Simple Tool for webhacking☆12Apr 4, 2023Updated 2 years ago
- ATM Configurator aka Tyupkin trojan☆12Mar 23, 2015Updated 10 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Reinforcement Learning (RL) is believe to be a more general approach towards Artificial Intelligence (AI). RL is the foundation for many …☆13Dec 22, 2022Updated 3 years ago
- 泛站/站群/蜘蛛池系统☆35Nov 16, 2017Updated 8 years ago
- Evil mouse sideways 8 paper weight's☆10Jul 10, 2024Updated last year
- Inspire by Samy Kamkar's "DiffBits" software, except this is written in Python, not Perl.☆14Jul 28, 2021Updated 4 years ago
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- exploit-database-papers☆13Nov 27, 2017Updated 8 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- enigma2 plugin project example with Docker and VS Code configuration☆16Feb 11, 2021Updated 5 years ago
- A windows kernel-mode rootkit with remote control☆12Sep 17, 2022Updated 3 years ago
- ExploitDB toolkit ExploitDB辅助工具☆11Jul 27, 2021Updated 4 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Some papers and exploit writeups about WebKit.☆20Feb 18, 2024Updated 2 years ago
- Offensive tool for Active Directory reconnaissance☆12Jan 28, 2026Updated last month
- Hide the TCP Connection☆22Mar 24, 2023Updated 2 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- Opencart Bruteforce and Upload Image☆11Aug 13, 2019Updated 6 years ago
- Life OpSec Guide on how to stay more anonymous, private, and secure in life. Take greater procatuations, and quit being tracked and mass …☆14Oct 20, 2022Updated 3 years ago