☆26Feb 9, 2021Updated 5 years ago
Alternatives and similar repositories for MouseJiggler
Users that are interested in MouseJiggler are comparing it to the libraries listed below
Sorting:
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 9 months ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- ☆13Aug 20, 2025Updated 6 months ago
- Oyedata is a tool to perform OData assessments☆13Aug 3, 2012Updated 13 years ago
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- python coding guidelines☆13May 31, 2022Updated 3 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- All Exploit List Made By Me☆17Apr 7, 2025Updated 10 months ago
- ☆13Jul 23, 2023Updated 2 years ago
- XSS Worm which steals victim's cookies and some information also spread others. Written in js, php and java.☆10Dec 12, 2017Updated 8 years ago
- ☆14Jul 9, 2024Updated last year
- ☆15Nov 23, 2015Updated 10 years ago
- Configurable, Community driven, HTTP C2 Profile☆27Feb 16, 2026Updated 2 weeks ago
- Targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems.☆18Jul 3, 2024Updated last year
- A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell☆15Sep 3, 2021Updated 4 years ago
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Feb 8, 2020Updated 6 years ago
- List of http static server one-liners☆15Jul 3, 2017Updated 8 years ago
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- ▶️ Server on Demand Appliance (Google Compute Engine) - Cloud Build with Terraform and Ansible Showcase☆13Oct 12, 2025Updated 4 months ago
- rcracki_mt : used to perform a rainbow table attack on password hashes☆13Sep 25, 2015Updated 10 years ago
- Testing POC for use cases☆25Nov 24, 2024Updated last year
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- Automate Windows Defender STIG to 100% Compliance☆19Jul 26, 2024Updated last year
- Get a reverse shell using PostgreSQL☆20Aug 16, 2024Updated last year
- Advanced web server fingerprinting☆22Sep 27, 2017Updated 8 years ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 8 months ago
- Simple DNS logging server☆19Dec 22, 2021Updated 4 years ago
- Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit☆13Mar 16, 2022Updated 3 years ago
- WOCSA Ethical Hacking Workshop for everyone☆20Feb 10, 2026Updated 3 weeks ago
- A Reverse Shell which uses an XML file on an SMB share as a communication channel.☆17Feb 17, 2024Updated 2 years ago
- Websocket communications with Push and Poll messages☆20Oct 26, 2025Updated 4 months ago
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 10 months ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆20Jul 18, 2023Updated 2 years ago
- The samples for the SkiaSharp repository.☆18Aug 17, 2022Updated 3 years ago
- ☆22Jan 2, 2026Updated 2 months ago
- 🔍 Improve your files enumeration with specific extensions!☆17Jan 11, 2022Updated 4 years ago
- This repository outlines my OSCP-focused methodology, specifically targeting common port numbers encountered during penetration testing. …☆24Jul 21, 2021Updated 4 years ago