Python's http.server extended to include a file upload page
☆333Feb 23, 2026Updated last month
Alternatives and similar repositories for uploadserver
Users that are interested in uploadserver are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆166Sep 18, 2025Updated 6 months ago
- ☆293Jan 7, 2015Updated 11 years ago
- Username tools for penetration testing☆1,341Sep 20, 2024Updated last year
- Extracts Key Values from .keytab files☆351Aug 26, 2020Updated 5 years ago
- rdp-sec-check is a Perl script to enumerate security settings of an RDP Service (AKA Terminal Services)☆242Mar 29, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- C# implementation of harmj0y's PowerView☆47Mar 22, 2020Updated 6 years ago
- linikatz is a tool to attack AD on UNIX☆594Oct 19, 2023Updated 2 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆153Apr 20, 2022Updated 3 years ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,315Dec 15, 2020Updated 5 years ago
- Windows AV Evasion☆839Apr 13, 2020Updated 5 years ago
- A Python based ingestor for BloodHound☆2,368Oct 24, 2025Updated 5 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,555Feb 20, 2026Updated last month
- Tunnel TCP connections through ICMP.☆554Nov 27, 2024Updated last year
- ☆12Aug 23, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- WhiteWinterWolf's PHP web shell☆764Dec 2, 2017Updated 8 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Nov 24, 2022Updated 3 years ago
- Wordlists for creating statistically likely username lists for use in password attacks and security testing. Used for pentesting for over…☆1,279Feb 16, 2026Updated last month
- In-depth ldap enumeration utility☆567Mar 4, 2026Updated 3 weeks ago
- getsystem via parent process using ps1 & embeded c#☆472Oct 26, 2023Updated 2 years ago
- ☆44Jul 5, 2024Updated last year
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆889Apr 8, 2025Updated 11 months ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆932Jul 26, 2021Updated 4 years ago
- PowerShell Pass The Hash Utils☆1,736Dec 9, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- socks4 reverse proxy for penetration testing☆641Jul 12, 2018Updated 7 years ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- Mythic C2 CheatSheet for OSEP☆62Jan 21, 2026Updated 2 months ago
- Cover's the top 10 "OWASP" security principle☆107Jan 27, 2020Updated 6 years ago
- The Network Execution Tool☆5,356Updated this week
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆131Aug 20, 2018Updated 7 years ago
- Dominate Active Directory with PowerShell.☆1,171Nov 28, 2025Updated 3 months ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,759Feb 27, 2026Updated 3 weeks ago
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Dec 22, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- ☆59Oct 24, 2024Updated last year
- ☆30Aug 19, 2020Updated 5 years ago
- Trying to tame the three-headed dog.☆4,935Nov 14, 2025Updated 4 months ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆301Jun 25, 2015Updated 10 years ago
- ☆29May 16, 2023Updated 2 years ago
- Abusing impersonation privileges through the "Printer Bug"☆2,206Sep 10, 2020Updated 5 years ago