A tool to generate OpenXML XXE Payloads written in Python3.
☆16Aug 21, 2019Updated 6 years ago
Alternatives and similar repositories for OpenXML-XXE-Generator
Users that are interested in OpenXML-XXE-Generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆38Nov 8, 2017Updated 8 years ago
- Script to utilize the v2 pwndb onion site to find leaked passwords.☆18Aug 29, 2022Updated 3 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Etherpad: real-time collaborative document editor☆10Mar 30, 2020Updated 5 years ago
- Wrap flutter codes inside Container/Stack.☆10Dec 11, 2022Updated 3 years ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆30Nov 18, 2025Updated 4 months ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- fully async implementation of Dirkjan's ROADTools☆34Mar 15, 2025Updated last year
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- API Ubiquity UniFi Controller☆16Feb 18, 2021Updated 5 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 6 months ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Convert curl commands to Go code in your browser☆18Jul 5, 2019Updated 6 years ago
- Fast, indexed regexp search over large file trees☆23Dec 5, 2019Updated 6 years ago
- A simple tool with the power of "Go" to find the hidden Vhosts defined at the server.☆19Jan 3, 2019Updated 7 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- CTF Write-ups☆27Apr 7, 2019Updated 6 years ago
- A general Javascript keylogger to be used in an XSS PoC☆19Feb 23, 2020Updated 6 years ago
- ☆12Jan 1, 2021Updated 5 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Below are some simple methods for exiting vim.☆20Sep 25, 2019Updated 6 years ago
- ☆11Aug 18, 2021Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Emulate the handshake packets of an RDP server with python☆15Jun 26, 2018Updated 7 years ago
- A scanner of the "World's Scariest" scanner☆17Dec 7, 2022Updated 3 years ago
- ☆10Dec 3, 2021Updated 4 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- ☆24Jun 8, 2019Updated 6 years ago