OsandaMalith / LFiFreakLinks
A unique automated LFi Exploiter with Bind/Reverse Shells
☆297Updated 10 years ago
Alternatives and similar repositories for LFiFreak
Users that are interested in LFiFreak are comparing it to the libraries listed below
Sorting:
- A tool to find and exploit servers vulnerable to Shellshock☆329Updated 2 years ago
- A free software to find the components installed in Joomla CMS, built out of the ashes of Joomscan.☆242Updated 2 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆553Updated 5 years ago
- Plugins for Metasploit Framework☆468Updated 6 years ago
- Penetration testing scripts☆145Updated 7 years ago
- davtest (improved)- Exploits WebDAV folders☆117Updated 2 years ago
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆439Updated last year
- An SNMPv3 User Enumerator and Attack tool☆258Updated 5 years ago
- RSMangler will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras.☆229Updated 6 years ago
- ☆244Updated 6 years ago
- Local File Inclusion Exploitation Tool (mirror)☆127Updated 8 years ago
- Panoptic is an open source penetration testing tool that automates the process of search and retrieval of content for common log and conf…☆317Updated 4 months ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆574Updated last year
- Collection of different exploits☆182Updated 5 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆259Updated 4 years ago
- Search Exploitable Software on Linux☆234Updated 2 years ago
- Windows Pentest Scripts☆233Updated 7 years ago
- Explore the network using VPNPivot tool☆273Updated 9 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆267Updated 7 years ago
- udp-proto-scanner is a Perl script which discovers UDP services by sending triggers to a list of hosts☆101Updated last year
- rdp-sec-check is a Perl script to enumerate security settings of an RDP Service (AKA Terminal Services)☆233Updated last year
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆424Updated 5 years ago
- Linux post exploitation enumeration and exploit checking tools☆182Updated 5 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆175Updated 3 months ago
- ☆190Updated last year
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆598Updated 10 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆285Updated 4 years ago
- pentest tools☆41Updated 8 years ago
- Rid_enum is a null session RID cycle attack for brute forcing domain controllers.☆296Updated last year
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆201Updated 4 years ago