Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables
☆51Sep 27, 2016Updated 9 years ago
Alternatives and similar repositories for Pa-th-zuzu
Users that are interested in Pa-th-zuzu are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Local Privilege Escalation☆210Feb 28, 2017Updated 9 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Nov 30, 2017Updated 8 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆52Feb 28, 2017Updated 9 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆70Aug 19, 2020Updated 5 years ago
- A simple keylogger application for XSS attack.☆16Aug 13, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆17Sep 14, 2017Updated 8 years ago
- Cronbased Dirty Cow Exploit☆30Jan 30, 2017Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 8 years ago
- Popcorn - the JSON fuzzer☆22Jul 27, 2014Updated 11 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- Using IPv6 to Bypass Security☆92Sep 4, 2025Updated 7 months ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago
- Google dorks generator to find open shells (on government sites)☆28Jul 9, 2014Updated 11 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/pentest-bookmarks☆12Aug 1, 2015Updated 10 years ago
- ☆19Jun 8, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated last year
- A simple personal Telegram bot plugins based.☆14Feb 10, 2016Updated 10 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆179May 23, 2016Updated 9 years ago
- ☆63Mar 21, 2018Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 8 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 7 years ago
- Examples for Arduino Cloud☆11Oct 10, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Report Generation Tool for Security Assessment☆65Dec 31, 2018Updated 7 years ago
- Script to test for default Knockd configurations to identify hidden remote services |☆37Sep 9, 2015Updated 10 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 12 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- Coin Dice 3.5☆11Oct 26, 2015Updated 10 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago