Hydragyrum / evil-rmi-server
An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228
☆12Updated 3 years ago
Alternatives and similar repositories for evil-rmi-server
Users that are interested in evil-rmi-server are comparing it to the libraries listed below
Sorting:
- ☆16Updated 5 months ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Updated 3 years ago
- A python3 and bash PoC for CVE-2021-4034 by Kim Schulz☆21Updated 3 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- ☆16Updated 3 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Updated 6 years ago
- Re-implementation of VirtueSecurity's benigncertain-monitor☆11Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆14Updated 4 years ago
- ☆26Updated 2 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆20Updated 4 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- Multithreaded spraying of a password on all accounts of a domain.☆20Updated 3 months ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- Runs sshd as a unprivileged user for persistence☆12Updated 5 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Updated 3 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆51Updated 2 months ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆12Updated last month
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- pwncat windows c2 components☆19Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago