WangYihang / Exploit-Framework
An Exploit framework for Web Vulnerabilities written in Python
☆170Updated 4 years ago
Alternatives and similar repositories for Exploit-Framework:
Users that are interested in Exploit-Framework are comparing it to the libraries listed below
- Acunetix 0day RCE☆192Updated 8 years ago
- A tool that checks and downloads scripts that will aid with privilege escalation on a Windows system.☆170Updated 8 years ago
- PoC for CVE-2018-0802 And CVE-2017-11882☆166Updated 7 years ago
- A plug-in of sublime 2/3 which is able to find PHP vulnerabilities☆57Updated 6 years ago
- Green-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.☆128Updated 6 years ago
- CVE-2018-3245-PoC☆167Updated 3 years ago
- CMS Exploit Framework☆191Updated 10 years ago
- ASTROID v 1.2 bypass most A.V softwares☆89Updated 7 years ago
- ☆84Updated 6 years ago
- exp of CVE-2018-15982☆181Updated 6 years ago
- fixed msf module for cve-2017-7269☆134Updated 7 years ago
- Apache Tomcat Remote Code Execution on Windows☆184Updated 5 years ago
- ☆78Updated 10 years ago
- This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后渗透后…☆189Updated 9 years ago
- Social Engineering Tool☆189Updated 6 years ago
- CVE-2018-7600 - Drupal 7.x RCE☆71Updated 6 years ago
- ☆182Updated last year
- some pentest scripts & tools by yaseng@uauc.net☆149Updated 4 years ago
- Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!☆295Updated 5 years ago
- CVE-2018-8174_python☆140Updated 2 years ago
- CVE-2018-8174 - VBScript memory corruption exploit.☆167Updated 6 years ago
- Reverse Shell Cheat Sheet TooL☆291Updated 4 years ago
- WebLogic Exploit☆142Updated 6 years ago
- CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script☆136Updated 6 years ago
- POC of https://research.checkpoint.com/extracting-code-execution-from-winrar/☆268Updated 5 years ago
- WAF Bypass Cheatsheet☆210Updated 7 years ago
- Automatically scan the inner network to detect whether they are vulnerable.☆140Updated 3 years ago