Herramienta para evadir disable_functions y open_basedir
☆492Sep 5, 2023Updated 2 years ago
Alternatives and similar repositories for Chankro
Users that are interested in Chankro are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pwn stuff.☆1,809May 31, 2022Updated 3 years ago
- Monitor linux processes without root permissions☆5,992Mar 1, 2026Updated 2 months ago
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.☆3,797Sep 29, 2025Updated 7 months ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,351Apr 18, 2023Updated 3 years ago
- ☆361Apr 24, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,152Apr 21, 2024Updated 2 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,370Mar 10, 2026Updated last month
- [Linux] Two Privilege Escalation techniques abusing sudo token☆732Apr 14, 2019Updated 7 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,671Nov 28, 2020Updated 5 years ago
- 一个各种方式突破Disable_functions达到命令执行的shell☆1,195Oct 17, 2023Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,170Jan 9, 2021Updated 5 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,312Aug 20, 2024Updated last year
- Abusing impersonation privileges through the "Printer Bug"☆2,240Sep 10, 2020Updated 5 years ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆960Apr 20, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,589Mar 11, 2026Updated last month
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆146Oct 27, 2019Updated 6 years ago
- Windows Exploit Suggester - Next Generation☆4,836Apr 23, 2026Updated last week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,768Updated this week
- A repository with 3 tools for pwn'ing websites with .git repositories available☆4,136Jun 14, 2023Updated 2 years ago
- Deserialization payload generator for a variety of .NET formatters☆3,723Dec 23, 2024Updated last year
- Some of my exploits.☆602Feb 25, 2021Updated 5 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,043Jun 3, 2021Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,975Aug 17, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆166Feb 9, 2022Updated 4 years ago
- getsystem via parent process using ps1 & embeded c#☆483Oct 26, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,691Updated this week
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,323Dec 15, 2020Updated 5 years ago
- brute-forcing su for fun and possibly profit☆99May 22, 2019Updated 6 years ago
- ODAT: Oracle Database Attacking Tool☆1,756Mar 31, 2026Updated last month
- A Python based ingestor for BloodHound☆2,383Oct 24, 2025Updated 6 months ago
- Various *nix tools built as statically-linked binaries☆3,680Aug 21, 2023Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,864Dec 4, 2025Updated 5 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,527May 1, 2025Updated last year
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,563Jan 10, 2025Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,193May 11, 2023Updated 2 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,768Dec 18, 2021Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,680Jul 18, 2024Updated last year
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,897Updated this week
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,912Sep 6, 2023Updated 2 years ago