Arinerron / uftpd_dirtravView external linksLinks
A proof of concept exploit that tries to pop you a shell on a uftpd server between versions 2.6 and 2.10
☆20Apr 16, 2020Updated 5 years ago
Alternatives and similar repositories for uftpd_dirtrav
Users that are interested in uftpd_dirtrav are comparing it to the libraries listed below
Sorting:
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- Mirror of http://rafale.org/~mattoufoutu/darkc0de.com☆13Jul 25, 2015Updated 10 years ago
- Confluence(<install-directory>/confluence/WEB-INF/)文件读取漏洞☆17Sep 2, 2019Updated 6 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆27Dec 23, 2025Updated last month
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated last month
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Atlassian Questions Hardcoded Password (CVE-2022-26138)☆31Jul 26, 2022Updated 3 years ago
- Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container☆32Apr 7, 2018Updated 7 years ago
- Collection of tools for privesc on Linux☆34Aug 28, 2013Updated 12 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Dec 3, 2020Updated 5 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16May 3, 2014Updated 11 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- A readline replacement. This is an evolution of the tinyrl library from clish.☆11Jan 29, 2016Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Oct 27, 2019Updated 6 years ago
- scripts used in my pentest work.☆44Jan 14, 2016Updated 10 years ago
- A command-line tool for Profinet-related tasks☆10Aug 24, 2020Updated 5 years ago
- ☆10Oct 5, 2016Updated 9 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Line editor and Cisco-style command tree☆13May 16, 2022Updated 3 years ago
- A Linux dual-stack PIM BIDIR (and more...) implementation.☆11Jan 27, 2022Updated 4 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 7 years ago
- Kubernetes, Emacs, done!☆10Dec 14, 2025Updated 2 months ago
- Build idbloader.img, trust.img, and uboot.img from compiled uboot☆10Feb 17, 2023Updated 2 years ago
- Convenient alternative to dd for writing images to SDCards☆14Feb 1, 2015Updated 11 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- This YouTube Ad Blocker extension is available for both Chrome and Firefox browsers. It is designed to block ads on YouTube videos and of…☆11Aug 6, 2023Updated 2 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- Ruby library for pure SSL/TLS handshake testing. No additional requirements.☆11Nov 8, 2021Updated 4 years ago
- Create CycloneDX Software Bill of Materials (SBOM) for Buildroot projects☆14Dec 9, 2025Updated 2 months ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- Arch Linux RISC-V images for Banana Pi F3 with SpacemiT K1 / M1 / X60.☆12Dec 21, 2025Updated last month