XXE Injection Payloads
☆28Jul 30, 2019Updated 6 years ago
Alternatives and similar repositories for XXE-Injection-Payloads
Users that are interested in XXE-Injection-Payloads are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆35Jan 12, 2026Updated 2 months ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆44Sep 18, 2019Updated 6 years ago
- LFI/RFI Payload Tests Project☆36Oct 21, 2019Updated 6 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- A general Javascript keylogger to be used in an XSS PoC☆19Feb 23, 2020Updated 6 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This is a writeup for CVE-2020-11107 reported by Maximilian Barz☆32Apr 3, 2020Updated 5 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Hunt down the secrets from the WebArchives for Fun and Profit☆163Dec 8, 2022Updated 3 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Aug 18, 2019Updated 6 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- Simple script for web directory scanning☆33May 22, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆13Aug 2, 2020Updated 5 years ago
- Shodan Favicon Hash Generator By Aziz Hakim @eternyle☆26May 25, 2024Updated last year
- fofa_api+bugscan插件扫描☆15Jun 24, 2024Updated last year
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- A small go tool to upload JSON files to the BloodHound community edition API☆31May 29, 2024Updated last year
- A simplex kernel-based keylogger written for fun, not evil.☆16Apr 3, 2018Updated 7 years ago
- ☆26Sep 2, 2025Updated 6 months ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated last month
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Writeup for the challenges in H@cktivityCon CTF 2020☆17Aug 6, 2020Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 6 months ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- gui uac bypass (netplwiz.exe)☆66Sep 2, 2019Updated 6 years ago
- A list of universities with vulnerability disclosure policies☆53Jul 13, 2021Updated 4 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago