Transition form local file inclusion attacks to remote code exection
☆69Aug 26, 2020Updated 5 years ago
Alternatives and similar repositories for LFI---RCE-Cheat-Sheet
Users that are interested in LFI---RCE-Cheat-Sheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A set of scripts to help automate the management of Burp Collaborator☆13Sep 5, 2025Updated 7 months ago
- A platform based on Node & RasPi to allow anyone to easily build apps and games for a NeoPixel table.☆10Mar 5, 2023Updated 3 years ago
- Describe how to use ffuf different options with examples☆14Jun 13, 2022Updated 3 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 7 years ago
- Command-line client to interact with Hack The Box☆16Apr 9, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Containers Wrapper is a Go library that provides a convenient and unified interface for interacting with container engines such as Docker…☆13Sep 10, 2023Updated 2 years ago
- my nuclei templates #new☆10Jun 24, 2024Updated last year
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆19Jan 23, 2025Updated last year
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36May 27, 2023Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 3 months ago
- Browser agnostic extension that enables pasting into password fields...☆15Jan 12, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆34Oct 25, 2023Updated 2 years ago
- List of payloads: reverse shell, bind shell, webshell.☆16Feb 26, 2022Updated 4 years ago
- Damn Vulnerable Rails app☆14Sep 20, 2012Updated 13 years ago
- EternalRomance&Eternalchampion&Eternalblue☆10May 1, 2017Updated 9 years ago
- Windows 7 Professional 7601 Service Pack 1 is vulnerable to eternalblue exploit and while exploiting this myself i ran into a number of i…☆11Jun 27, 2021Updated 4 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 5 years ago
- Fofa Pro Api下载工具☆16Nov 18, 2019Updated 6 years ago
- ☆10Oct 1, 2019Updated 6 years ago
- Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI☆27Jan 6, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Send controlled amount of bytes, send msf-pattern, calculate offset, custom buffer, badcharacters all in one.☆15Apr 20, 2024Updated 2 years ago
- Application Security Mind Maps☆11Apr 10, 2021Updated 5 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- A collection of config files for linux focusing on hackthebox theme☆55Apr 10, 2026Updated 3 weeks ago
- Inject RDPThief into memory with PowerShell.☆65Jan 21, 2025Updated last year
- A wordlist for Infosec people in Pakistan☆20Aug 6, 2020Updated 5 years ago
- Filezilla local admin port exploit☆13Sep 13, 2017Updated 8 years ago
- ☆96Oct 1, 2021Updated 4 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Mime type detection in ruby via file extension or file content☆10Sep 5, 2021Updated 4 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆37Dec 4, 2025Updated 4 months ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- POC for Spring Kafka Deserialization Vulnerability CVE-2023-34040☆46Apr 16, 2026Updated 2 weeks ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- Demonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.☆25Dec 3, 2023Updated 2 years ago
- ☆12May 13, 2024Updated last year