Edd13Mora / Hadoken
Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.
☆49Updated last year
Alternatives and similar repositories for Hadoken:
Users that are interested in Hadoken are comparing it to the libraries listed below
- CVE-2023-34960 Chamilo PoC☆36Updated last year
- ☆34Updated last month
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Updated 2 years ago
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆66Updated 3 months ago
- Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)☆40Updated 3 months ago
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year
- Dump Windows SAM hashes☆41Updated last year
- CVE-2024-27956 WordPress Automatic < 3.92.1 - Unauthenticated SQL Injection☆18Updated 8 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆39Updated 2 years ago
- Encoder PHP webshell to bypass WAF using XOR operations.☆52Updated last year
- Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled☆36Updated 3 weeks ago
- Proof of Concept Exploit for CVE-2024-9464☆44Updated 3 months ago
- Windows Privilege Escalation☆54Updated 2 years ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆86Updated last year
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646☆27Updated last year
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆48Updated 7 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆78Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated last year
- The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The…☆23Updated last year
- backdoor exploit for vsftpd 2.3.4 on python☆15Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆65Updated 8 months ago
- ☆54Updated 2 months ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆44Updated last year
- Template Nuclei SSTI☆29Updated last year
- Nuclei template and information about the POC for CVE-2024-25600☆28Updated 10 months ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆58Updated last year
- ☆32Updated last month
- Authentication Bypass in GoAnywhere MFT☆64Updated 11 months ago
- Wolfy AV Bypasser☆28Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year