Transition form local file inclusion attacks to remote code exection
☆69Aug 26, 2020Updated 5 years ago
Alternatives and similar repositories for LFI---RCE-Cheat-Sheet
Users that are interested in LFI---RCE-Cheat-Sheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A set of scripts to help automate the management of Burp Collaborator☆13Sep 5, 2025Updated 8 months ago
- A platform based on Node & RasPi to allow anyone to easily build apps and games for a NeoPixel table.☆10Mar 5, 2023Updated 3 years ago
- Describe how to use ffuf different options with examples☆14Jun 13, 2022Updated 3 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 7 years ago
- Command-line client to interact with Hack The Box☆16Apr 9, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Containers Wrapper is a Go library that provides a convenient and unified interface for interacting with container engines such as Docker…☆13Sep 10, 2023Updated 2 years ago
- my nuclei templates #new☆10Jun 24, 2024Updated last year
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- Dos-attacX is a framework designed for educational purposes to simulate a single-machine attack on a target's server. This tool sends con…☆19Oct 16, 2025Updated 7 months ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36May 27, 2023Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 4 months ago
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated 2 years ago
- List of payloads: reverse shell, bind shell, webshell.☆16Feb 26, 2022Updated 4 years ago
- Damn Vulnerable Rails app☆14Sep 20, 2012Updated 13 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 5 years ago
- Windows 7 Professional 7601 Service Pack 1 is vulnerable to eternalblue exploit and while exploiting this myself i ran into a number of i…☆11Jun 27, 2021Updated 4 years ago
- ☆10Oct 1, 2019Updated 6 years ago
- Fofa Pro Api下载工具☆16Nov 18, 2019Updated 6 years ago
- Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI☆27Jan 6, 2021Updated 5 years ago
- Application Security Mind Maps☆12Apr 10, 2021Updated 5 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- A collection of config files for linux focusing on hackthebox theme☆55Apr 10, 2026Updated last month
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Inject RDPThief into memory with PowerShell.☆66Jan 21, 2025Updated last year
- Building Sites With Middleman - WatchLearn Youtube Series☆13Oct 29, 2015Updated 10 years ago
- Deliberately vulnerable PHP code examples for testing static analysis tools and security training, covering common vulnerabilities such a…☆12May 1, 2026Updated 3 weeks ago
- Track-Ripper is a simple tool that can be used to track someone easily which can be used to track fraudsters or other criminals☆34Dec 8, 2025Updated 5 months ago
- ☆16Apr 6, 2021Updated 5 years ago
- Cyberpunx is the most complete hacking tool and can be run on Termux or Kali Linux with various very useful features and has been proven …☆42Oct 16, 2025Updated 7 months ago
- Privilege escalation in Docker☆32Jun 30, 2022Updated 3 years ago
- Filezilla local admin port exploit☆13Sep 13, 2017Updated 8 years ago
- ☆96Oct 1, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- Mime type detection in ruby via file extension or file content☆10Sep 5, 2021Updated 4 years ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆37Dec 4, 2025Updated 5 months ago
- POC for Spring Kafka Deserialization Vulnerability CVE-2023-34040☆46May 4, 2026Updated 2 weeks ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- ☆12May 13, 2024Updated 2 years ago