Ranger11Danger / UnrealIRCd-3.2.8.1-BackdoorLinks
My backdoor script for a vulnerable version of UnrealIRCd
☆25Updated last year
Alternatives and similar repositories for UnrealIRCd-3.2.8.1-Backdoor
Users that are interested in UnrealIRCd-3.2.8.1-Backdoor are comparing it to the libraries listed below
Sorting:
- ☆220Updated 5 years ago
- ☆215Updated 5 years ago
- PHP shells that work on Linux OS, macOS, and Windows OS.☆505Updated last year
- Aspx reverse shell☆114Updated 5 years ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆291Updated 3 years ago
- Some notes about Hydra for bruteforcing☆185Updated 5 years ago
- Build Alpine Linux images for LXD☆198Updated 2 months ago
- Simple php reverse shell implemented using binary .☆424Updated last year
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆151Updated last year
- CVE-2019-1388 Abuse UAC Windows Certificate Dialog☆20Updated 4 years ago
- MS17-010☆271Updated 3 years ago
- WhiteWinterWolf's PHP web shell☆707Updated 7 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆105Updated 7 years ago
- Root shell PoC for CVE-2021-3156☆69Updated 4 years ago
- ☆261Updated 10 years ago
- Collection of reverse shells for red team operations.☆513Updated 6 months ago
- GitLab User Enumeration☆37Updated 8 months ago
- SSTI Payload Generator☆91Updated 3 years ago
- This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.☆74Updated last year
- All you need about Active Directory☆16Updated 4 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆636Updated last month
- Writeups for vulnerable machines.☆177Updated 3 years ago
- Joomla login bruteforce☆80Updated last year
- ☆169Updated 5 months ago
- This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.☆41Updated 2 years ago
- Don't let buffer overflows overflow your mind☆442Updated 5 years ago
- Active Directory Wordlists☆100Updated 5 years ago
- Proof of Concept for CVE-2019-18634☆222Updated 4 years ago
- Create a list of possible usernames for bruteforcing☆77Updated last year
- A 2 part modified version of the Mobile Mouse 3.6.0.4 exploit.☆14Updated 2 years ago