A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version
☆14May 8, 2019Updated 6 years ago
Alternatives and similar repositories for postgres_cmd_execution_nine_three
Users that are interested in postgres_cmd_execution_nine_three are comparing it to the libraries listed below
Sorting:
- ☆15Jul 5, 2019Updated 6 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 7 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Feb 24, 2019Updated 7 years ago
- Inject Frida-Gadget into a local process☆26Jul 5, 2019Updated 6 years ago
- ☆13Oct 12, 2017Updated 8 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago
- 稳定多线程中的inline hook☆16Jun 19, 2019Updated 6 years ago
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- Metasploit reverse TCP stager fully undetectable☆18Nov 29, 2015Updated 10 years ago
- ☆17Oct 25, 2018Updated 7 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- Packer and vagrant scripts to automate building Windows and Linux machines on vCenter☆17Jul 7, 2019Updated 6 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- ☆21Dec 1, 2019Updated 6 years ago
- ☆18Dec 24, 2018Updated 7 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- 黑客神器,谁用谁知道!☆36Jul 10, 2019Updated 6 years ago
- Post module for Metasploit to execute ELF in memory☆86Nov 23, 2018Updated 7 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Oct 30, 2019Updated 6 years ago
- Fuzzing results for various interpreters.☆82Apr 26, 2018Updated 7 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- sshshell/sshcmd/sshlogin/sshcrack(SSH交互式Shell/内网渗透专用非交互式Shell/SSH密码爆破)Windows & Linux☆66Nov 16, 2020Updated 5 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Nov 2, 2013Updated 12 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- Green-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.☆130Aug 13, 2018Updated 7 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- 做过的实验,踩过的坑☆40Jun 7, 2018Updated 7 years ago