Python's http.server extended to include a file upload page
☆331Feb 23, 2026Updated last week
Alternatives and similar repositories for uploadserver
Users that are interested in uploadserver are comparing it to the libraries listed below
Sorting:
- ☆164Sep 18, 2025Updated 5 months ago
- ☆288Jan 7, 2015Updated 11 years ago
- C# implementation of harmj0y's PowerView☆46Mar 22, 2020Updated 5 years ago
- rdp-sec-check is a Perl script to enumerate security settings of an RDP Service (AKA Terminal Services)☆241Mar 29, 2024Updated last year
- Username tools for penetration testing☆1,333Sep 20, 2024Updated last year
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆149Apr 20, 2022Updated 3 years ago
- linikatz is a tool to attack AD on UNIX☆595Oct 19, 2023Updated 2 years ago
- Extracts Key Values from .keytab files☆348Aug 26, 2020Updated 5 years ago
- A Python based ingestor for BloodHound☆2,347Oct 24, 2025Updated 4 months ago
- Tunnel TCP connections through ICMP.☆549Nov 27, 2024Updated last year
- In-depth ldap enumeration utility☆562Feb 19, 2026Updated 2 weeks ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,547Feb 20, 2026Updated last week
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,302Dec 15, 2020Updated 5 years ago
- Windows AV Evasion☆836Apr 13, 2020Updated 5 years ago
- getsystem via parent process using ps1 & embeded c#☆467Oct 26, 2023Updated 2 years ago
- WhiteWinterWolf's PHP web shell☆761Dec 2, 2017Updated 8 years ago
- Wordlists for creating statistically likely username lists for use in password attacks and security testing. Used for pentesting for over…☆1,268Feb 16, 2026Updated 2 weeks ago
- ☆14Sep 26, 2023Updated 2 years ago
- ☆12Aug 23, 2019Updated 6 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆129Aug 20, 2018Updated 7 years ago
- ☆29Aug 19, 2020Updated 5 years ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,745Updated this week
- The Network Execution Tool☆5,296Updated this week
- PowerShell Pass The Hash Utils☆1,724Dec 9, 2018Updated 7 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Dec 22, 2023Updated 2 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Nov 24, 2022Updated 3 years ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆883Apr 8, 2025Updated 10 months ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆928Jul 26, 2021Updated 4 years ago
- Cover's the top 10 "OWASP" security principle☆105Jan 27, 2020Updated 6 years ago
- Active Directory and Internal Pentest Cheatsheets☆2,068Feb 23, 2026Updated last week
- Dominate Active Directory with PowerShell.☆1,164Nov 28, 2025Updated 3 months ago
- socks4 reverse proxy for penetration testing☆641Jul 12, 2018Updated 7 years ago
- ☆44Jul 5, 2024Updated last year
- Trying to tame the three-headed dog.☆4,904Nov 14, 2025Updated 3 months ago
- Deploy a phishing infrastructure on the fly.☆77Dec 21, 2024Updated last year
- ☆62Jul 9, 2023Updated 2 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Oct 15, 2020Updated 5 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago