Jsmoreira02 / Malicious_PluginLinks
Hacking WordPress Plugins - Authenticated Shell Upload, by compromising admin console and upload a malicious plugin with PHP (reverse shell code)
☆20Updated last year
Alternatives and similar repositories for Malicious_Plugin
Users that are interested in Malicious_Plugin are comparing it to the libraries listed below
Sorting:
- A fast WordPress plugin enumeration tool☆728Updated 3 weeks ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆383Updated 8 months ago
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆442Updated 6 months ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆213Updated 8 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆426Updated 10 months ago
- A WordPress plugin that provides reverse shell functionality with a graphical user interface (GUI) for configuration. This plugin allows …☆34Updated 7 months ago
- Malicious Macro Generator for LibreOffice/OpenOffice☆57Updated 2 years ago
- A collection of useful tools and scripts were developed and gathered throughout the Offensive Security's PEN-300 (OSEP) course.☆303Updated 3 months ago
- This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.☆74Updated last year
- Active Directory Enumeration and Exploitation☆11Updated 4 months ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆160Updated last year
- Linux privilege escalation exploits collection.☆158Updated 2 years ago
- A simple tool for bypassing file upload restrictions.☆884Updated last year
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆430Updated last year
- Multiplayer pivoting solution☆463Updated 3 weeks ago
- Heavily obfuscated PowerShell reverse shell that can bypass Windows Defender☆23Updated 10 months ago
- Just another Powerview alternative but on steroids☆832Updated 2 weeks ago
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆506Updated 10 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆807Updated 8 months ago
- PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC☆300Updated last year
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆153Updated last year
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆178Updated 8 months ago
- A comprehensive guide/material for anyone looking to get into infosec or take the OSCP exam☆44Updated 6 years ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆449Updated 3 months ago
- 60k+ WordPress Nuclei templates, updated daily from Wordfence intel—filter by severity/tags/CVE and scan in one line. 🚀🔒☆1,140Updated last week
- ☆127Updated 2 years ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆474Updated 5 months ago
- A generic sysreptor template to write on-premise related Altered Security's certifications reports of compromission.☆19Updated 3 months ago
- ☆380Updated 8 months ago
- Sliver CheatSheet for OSEP☆210Updated last month