SamDecrock / node-cve-2018-4407
Node.js PoC exploit code for CVE-2018-4407
☆11Updated 6 years ago
Alternatives and similar repositories for node-cve-2018-4407:
Users that are interested in node-cve-2018-4407 are comparing it to the libraries listed below
- CVE-2020-0688☆10Updated 5 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- Template for asynchronously controlling meterpreter sessions☆12Updated 6 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆22Updated 6 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆25Updated 6 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Ospy is a penetration testing tool for macOS, include keylogger, live screen catcher, reveres shell and more. Developed in c☆24Updated 5 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆12Updated 6 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆19Updated 8 years ago
- module for certexfil☆15Updated 2 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- Scans an internal network using massscan and nmap☆20Updated last year
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- ☆39Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated 11 months ago
- ☆13Updated 7 years ago