Entity0x1A / QR-Code-Compromise
Can a QR scanner compromise your system
☆8Updated 5 years ago
Alternatives and similar repositories for QR-Code-Compromise:
Users that are interested in QR-Code-Compromise are comparing it to the libraries listed below
- A tool for generating reverse shell payloads on the fly.☆10Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated 8 months ago
- VLAN attacks toolkit☆14Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆17Updated last year
- King of Bug Bounty Tips Simple Tool☆13Updated 3 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated 11 months ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 11 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- OSCP_OSWA_OSED_OSEP_OSWE☆7Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- ☆13Updated last month
- ☆20Updated 3 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆18Updated last year
- Bash script to generate reverse shell payloads☆19Updated last year
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆14Updated 2 months ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 8 months ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆23Updated last year
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated 11 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆17Updated 11 months ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 11 months ago
- Automated tool for domains & Subdomains Gathering☆13Updated last year
- xdebug 2.5.5 RCE exploit☆30Updated 3 months ago
- Automate All Pivoting System Enumeration with this Bash Script☆12Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year