VoidSec / SolarPuttyDecryptLinks
A post-exploitation tool to decrypt SolarPutty's sessions files
☆36Updated 2 years ago
Alternatives and similar repositories for SolarPuttyDecrypt
Users that are interested in SolarPuttyDecrypt are comparing it to the libraries listed below
Sorting:
- Exploit to dump ipmi hashes☆37Updated 2 years ago
- A python3 and bash PoC for CVE-2021-4034 by Kim Schulz☆21Updated 3 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆72Updated 2 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆67Updated 6 months ago
- Rewriting SIET to python3☆53Updated last year
- A utility for automating the testing and re-signing of Express.js cookie secrets.☆59Updated 2 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- ☆27Updated 3 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 9 months ago
- CVE-2023-2255 Libre Office☆62Updated 2 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆41Updated 3 years ago
- ☆46Updated 3 weeks ago
- ☆96Updated last week
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆24Updated 2 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆115Updated 2 months ago
- Creates a malicious ODF document help leak NetNTLM Creds☆34Updated 2 years ago
- ☆42Updated last year
- Spoofcheck☆43Updated 5 months ago
- ☆38Updated 3 years ago
- Upload files done during my research.☆166Updated 6 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 2 years ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Updated 5 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆62Updated 2 years ago
- Collection of username lists for enumerating kerberos domain users☆103Updated 7 years ago
- Shell Simulation over Net-SNMP with extend functionality☆98Updated 4 years ago
- CLI monitor for windows process- & file activity☆93Updated 4 years ago
- Community documentation for known Hack The Box v4 API endpoints☆26Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago