MatrixTM / FTPDumper
β‘ Scan World FTP Servers and Steal Their Data π
β35Updated 2 months ago
Alternatives and similar repositories for FTPDumper:
Users that are interested in FTPDumper are comparing it to the libraries listed below
- OpenSSH 9.1 vulnerability mass scan and exploitβ8Updated last year
- Perform With Massive Wordpress Enumerationβ11Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)β103Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)β39Updated 6 months ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipeβ¦β40Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple wayβ38Updated last year
- Simple Powershell Http shell With WEB UIβ70Updated this week
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalationβ82Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.β47Updated 9 months ago
- Generate FUD Droppers that are undetectable by popular AV'sβ31Updated last year
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the bestβ¦β70Updated last year
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.β89Updated 2 years ago
- xdebug 2.5.5 RCE exploitβ30Updated 2 months ago
- i will upload all the books that helped me in learning in this repoβ20Updated 2 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotalβ76Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β122Updated last year
- an exploit of Server-side request forgery (SSRF)β50Updated 7 months ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, aβ¦β24Updated 2 years ago
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and β¦β39Updated last year
- OpenSSH 9.1 vulnerability mass scan and exploitβ103Updated 2 years ago
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search β¦β32Updated 3 months ago
- ProxyChecker Made in NodeJSβ36Updated 3 years ago
- BackdoorSim: An Educational into Remote Administration Toolsβ103Updated last year
- ( Wordpress Exploit ) Wordpress Multiple themes - Unauthenticated Arbitrary File Uploadβ10Updated 2 years ago
- CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injectionβ21Updated 11 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP β¦β35Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defenderβ21Updated 2 years ago
- Huge Collection of Wordpress Exploits and CVESβ123Updated 2 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)β31Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actualβ¦β59Updated 3 years ago