DavidWittman / wpxmlrpcbruteView external linksLinks
Brute force WordPress sites vulnerabile to XML-RPC amplification.
☆105Sep 10, 2022Updated 3 years ago
Alternatives and similar repositories for wpxmlrpcbrute
Users that are interested in wpxmlrpcbrute are comparing it to the libraries listed below
Sorting:
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Burp extension to edit messages with UTF-8☆12Jul 3, 2018Updated 7 years ago
- ☆15Apr 12, 2018Updated 7 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 5 years ago
- Useful windows tools for Blue, Red & Purple teams☆11Feb 8, 2026Updated last week
- Slightly modified version of https://raw.githubusercontent.com/killswitch-GUI/CobaltStrike-ToolKit/master/HTTPsC2DoneRight.sh☆12Nov 16, 2017Updated 8 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- Much like John the Ripper, without all the fancy shit. Just reads from a wordlist and cracks those hashes.☆16Jul 15, 2020Updated 5 years ago
- rootkit-Ninja is simple linux rootkit to keep gained root access with several tricks☆15Sep 8, 2018Updated 7 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 7 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 6 years ago
- Scan networks for HTTP servers, do stuff when you find them.☆13Sep 11, 2017Updated 8 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆62Jul 8, 2017Updated 8 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- retrive metadata endpoint data with these one liners.☆41Aug 11, 2020Updated 5 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- AD-control-paths LDAP submodule☆19Jun 20, 2018Updated 7 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- PyEvade is a simple tool to bypass many antivirus solutions on windows for metasploit payloads.☆16Oct 15, 2017Updated 8 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Erku is an IPTV and video on demand client for the Roku OS.☆12Dec 29, 2024Updated last year
- C# DCOM Execution☆18Aug 4, 2019Updated 6 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- Web Application Penetration Testing tools and Materials for Ethical Hackers.☆21Dec 11, 2019Updated 6 years ago
- z/OS Mainframe TPX panel account enumerator and brute forcer☆20Jan 10, 2018Updated 8 years ago
- Files compiled from the Logica breach investigation materials☆45Aug 14, 2018Updated 7 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Feb 15, 2017Updated 9 years ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 2 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- ☆17Nov 25, 2015Updated 10 years ago