MySQL Injection Exfoliation Optimization
☆24Sep 15, 2019Updated 6 years ago
Alternatives and similar repositories for MySQL-Injection-Exfiltration-Optimization
Users that are interested in MySQL-Injection-Exfiltration-Optimization are comparing it to the libraries listed below
Sorting:
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Aug 18, 2019Updated 6 years ago
- 攻击Java Web应用-[Java Web安全]☆15Dec 9, 2020Updated 5 years ago
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- SharpGetTitle - 基于 C# 的多线程 Web Title 扫描器☆15Nov 26, 2020Updated 5 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- MySQL JDBC Deserialization Payload / MySQL客户端jdbc反序列化漏洞payload☆13Feb 8, 2020Updated 6 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 7 years ago
- CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE☆63Jun 1, 2023Updated 2 years ago
- [CVE-2020-1948] Apache Dubbo Provider default deserialization cause RCE☆18Mar 17, 2025Updated last year
- CVE-2020-1938漏洞复现☆38Feb 21, 2020Updated 6 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Entra ID Password Protection Banned Password Lists☆18Apr 16, 2024Updated last year
- New Found 0-days!☆36Dec 4, 2019Updated 6 years ago
- Webmin Remote Code Execution (authenticated)☆33Sep 1, 2019Updated 6 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- ☆17Oct 25, 2018Updated 7 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated last month
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 6 months ago
- CVE-2018-3191 反弹shell☆16Oct 23, 2018Updated 7 years ago
- Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)☆267Dec 19, 2019Updated 6 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Jira未授权SSRF漏洞☆31Sep 30, 2019Updated 6 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- DNS File EXfiltration☆45Apr 12, 2024Updated last year
- 泛微ecology OA系统接口存在数据库配置信息泄露漏洞☆50Jul 13, 2020Updated 5 years ago
- CVE-2020-9548:FasterXML/jackson-databind 远程代码执行漏洞☆24Mar 2, 2020Updated 6 years ago
- ☆85Dec 6, 2019Updated 6 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- fastjson远程命令执行漏洞,jndi方式☆40Dec 7, 2017Updated 8 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Oct 4, 2019Updated 6 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Advisories and Proofs of Concept by BlackArrow☆19Dec 17, 2024Updated last year
- A tool to create obfuscated HTA script.☆178Jul 2, 2021Updated 4 years ago
- A Burp extension to show the Collaborator client in a tab☆24Dec 23, 2022Updated 3 years ago