JohnHammond / drupalgeddon2
lorddemon/drupalgeddon2 just working with Python3
☆10Updated 8 months ago
Related projects: ⓘ
- ☆19Updated 2 years ago
- list of usernames and email addresses for pentests☆38Updated 2 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆30Updated 2 years ago
- Notes for red teamers - from cloud to Active Directory to many things in between.☆51Updated 8 months ago
- My Linux Privilege Escalation notes which is part of my OSCP Preperation☆67Updated last year
- ☆24Updated 2 years ago
- Security Lab☆13Updated last year
- ☆18Updated this week
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆15Updated 3 years ago
- PHP 7 and safe-build update of the popular C99 variant of PHP Shell with MySQL support☆22Updated 4 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated 5 months ago
- A Reverse Shell which uses an XML file on an SMB share as a communication channel.☆13Updated 7 months ago
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆91Updated last year
- ☆25Updated last year
- Multithread reverse shell listener☆17Updated 7 months ago
- TryHackMe challenges☆28Updated this week
- Python exploit for vsftpd 2.3.4 - Backdoor Command Execution☆12Updated last year
- 🥊 ddos clustering☆40Updated last year
- ☆48Updated last year
- My Reverse Shell Cheat Sheet☆12Updated 2 years ago
- tool to bypass 403/401 pages ( helpful for bug hunting)☆17Updated last year
- ☆14Updated this week
- Crappy Golang code to list local listening ports and their associated processes.☆28Updated last year
- Templates for submissions☆49Updated 9 months ago
- A tool to dump exposed .git repositories☆41Updated 3 weeks ago
- ☆35Updated this week
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆98Updated last month
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆12Updated 2 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆20Updated 10 months ago
- ☆12Updated this week