A unique automated LFi Exploiter with Bind/Reverse Shells
☆308Jun 25, 2015Updated 10 years ago
Alternatives and similar repositories for LFiFreak
Users that are interested in LFiFreak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,932Apr 13, 2022Updated 4 years ago
- Local file inclusion exploitation tool☆951Oct 1, 2025Updated 7 months ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆168Aug 23, 2019Updated 6 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Advanced Web Shell☆580May 1, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- LNHG - Mass Web Fingerprinter☆63Feb 22, 2016Updated 10 years ago
- application server attack toolkit☆688Apr 6, 2020Updated 6 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- BruteXSS is a tool written in python simply to find XSS vulnerabilities in web application. This tool was originally developed by Shawar …☆563Jun 17, 2021Updated 4 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- Username tools for penetration testing☆1,377Sep 20, 2024Updated last year
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆575Dec 9, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,739Dec 1, 2024Updated last year
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,045Nov 24, 2019Updated 6 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- A WebDAV PROPFIND C2 tool☆120Aug 27, 2019Updated 6 years ago
- WebApp Information Gatherer☆551May 29, 2018Updated 7 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- Post Exploitation Collection☆1,573May 1, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,506Dec 19, 2023Updated 2 years ago
- Auto Domain Admin and Network Exploitation.☆298Dec 21, 2017Updated 8 years ago
- ☆615Oct 4, 2024Updated last year
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆426Feb 18, 2020Updated 6 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- A simple utility to convert EXE files to JPEG images and vice versa.☆206Aug 21, 2015Updated 10 years ago
- A default credential scanner.☆1,501Jul 8, 2025Updated 9 months ago
- Sniffs sensitive data from interface or pcap☆1,830Nov 2, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Explore the network using VPNPivot tool☆275Jul 21, 2016Updated 9 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 10 years ago
- Python / C# Unmanaged PowerShell based RAT☆775Mar 29, 2023Updated 3 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- A free software to find the components installed in Joomla CMS, built out of the ashes of Joomscan.☆255Aug 1, 2023Updated 2 years ago
- A simple tool to convert the IP to a DWORD IP☆145Jul 29, 2022Updated 3 years ago