TarlogicSecurity / ChankroLinks
Herramienta para evadir disable_functions y open_basedir
☆461Updated 2 years ago
Alternatives and similar repositories for Chankro
Users that are interested in Chankro are comparing it to the libraries listed below
Sorting:
- ☆182Updated 6 months ago
- Simple php reverse shell implemented using binary .☆428Updated last year
- MS17-010☆272Updated 3 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,023Updated 4 years ago
- Linux PAM Backdoor☆351Updated last year
- List DTDs and generate XXE payloads using those local DTDs.☆639Updated last year
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆565Updated 3 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆648Updated 8 months ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆638Updated 2 months ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆568Updated last year
- A pentesting tool that dumps the source code from .git even when the directory traversal is disabled☆227Updated 3 years ago
- Using this script, you can enumerate Usernames and passwords of Nosql(mongodb) injecion vulnerable web applications.☆172Updated 5 years ago
- Automated script for performing Padding Oracle attacks☆795Updated last year
- Contents for Node.Js Security Course☆343Updated 4 years ago
- Proof of Concept for CVE-2019-18634☆225Updated 4 years ago
- Search gtfobins and lolbas files from your terminal☆461Updated 3 years ago
- ☆163Updated 3 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆283Updated 2 years ago
- project-blacklist3r☆591Updated 3 weeks ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆740Updated 2 years ago
- ☆215Updated 5 years ago
- ☆266Updated 6 years ago
- HTTP file upload scanner for Burp Proxy☆415Updated 2 years ago
- Shellshock exploit + vulnerable environment☆218Updated 2 years ago
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆183Updated 3 years ago
- NodeJS Red-Team Cheat Sheet☆220Updated 6 years ago
- Simple websites vulnerable to Server Side Template Injections(SSTI)☆404Updated 2 years ago
- OSWE Preparation☆638Updated 3 years ago
- A simple web app with a XXE vulnerability.☆229Updated 3 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆719Updated 6 years ago