OpenSSH <=6.6 SFTP misconfiguration universal exploit
☆27Mar 20, 2018Updated 7 years ago
Alternatives and similar repositories for sftp-exploit
Users that are interested in sftp-exploit are comparing it to the libraries listed below
Sorting:
- Binary reversing tool to find all possible code paths between two functions.☆28Apr 25, 2018Updated 7 years ago
- SECD machine and Lispkit Lisp compiler, in Python☆10Oct 25, 2017Updated 8 years ago
- ☆13Jun 11, 2014Updated 11 years ago
- ☆11Nov 28, 2016Updated 9 years ago
- a exec jsp shell, simply like weevely php C/S shell.☆14Jun 21, 2022Updated 3 years ago
- ☆19Jun 29, 2012Updated 13 years ago
- (harmless) mirai botnet client☆14Dec 29, 2016Updated 9 years ago
- Goby support CVE-2019-0708 "BlueKeep" vulnerability check☆17May 23, 2019Updated 6 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆21May 11, 2017Updated 8 years ago
- The Demo for CVE-2017-11427☆12Mar 3, 2018Updated 7 years ago
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Apr 16, 2015Updated 10 years ago
- Collection of scripts to test your website against vulnerabilities.☆18Mar 10, 2024Updated last year
- ☆54Aug 10, 2018Updated 7 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- Python Web framework P0wner☆75Jan 27, 2013Updated 13 years ago
- Various tools to track the Mirai botnet☆20Nov 3, 2016Updated 9 years ago
- Google dorks generator to find open shells (on government sites)☆28Jul 9, 2014Updated 11 years ago
- Proof of concept exploit for CVE-2017-3599☆23Apr 18, 2017Updated 8 years ago
- Burp Extension to manipulate AES encrypted payloads☆24Aug 2, 2017Updated 8 years ago
- Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script.☆333Sep 13, 2021Updated 4 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆79Jun 30, 2018Updated 7 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆24Nov 18, 2017Updated 8 years ago
- Mirai Botnet DB Project☆26Mar 20, 2019Updated 6 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Mar 8, 2019Updated 6 years ago
- Client API to query the Phishing Initiative service API☆24Jan 8, 2026Updated last month
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Oct 8, 2017Updated 8 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆60Feb 10, 2017Updated 9 years ago
- guest→system(UAC手动提权)☆73Mar 18, 2020Updated 5 years ago
- Sirve para ver las peticiones entre el navegador y el servidor pero en el caso del internet gratis a través de vpn también los puede ayud…☆11Oct 1, 2021Updated 4 years ago
- ## Now you can download the most powerful tools using this simple script ### Screenshot  SHell with full pty support and both reverse / bindport connection mode.☆30May 12, 2013Updated 12 years ago
- Hacking challenges☆31Oct 3, 2017Updated 8 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- Mimosa Framework to abuse EPC functionality on CISCO Routers.☆30Dec 12, 2024Updated last year
- Analysis of different techniques to bypass Network Security Config with Frida☆33Dec 7, 2020Updated 5 years ago
- Scripts to parse and analyze pgp key server data☆33Jul 16, 2020Updated 5 years ago
- [discontinued] Mass exploiter of CVE-2015-1579 for WordPress CMS☆28May 21, 2018Updated 7 years ago