Some wordpress user enumeration scripts.
☆38Dec 21, 2016Updated 9 years ago
Alternatives and similar repositories for wp-user-enum-scripts
Users that are interested in wp-user-enum-scripts are comparing it to the libraries listed below
Sorting:
- ☆14Feb 15, 2022Updated 4 years ago
- Wordpress Plugin "WP Checkout" Mass exploit☆16Jun 18, 2017Updated 8 years ago
- ☆14Apr 9, 2019Updated 6 years ago
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆11May 19, 2020Updated 5 years ago
- wp content injection mass exploit Perl Script☆12Jul 11, 2017Updated 8 years ago
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆23Nov 17, 2017Updated 8 years ago
- Simple shell script for automated domain recognition with some tools☆20Mar 9, 2019Updated 6 years ago
- joomla com_xcloner exploit [Mass Autoexploiting script coded with python]☆13Apr 29, 2019Updated 6 years ago
- Toolset for detecting reflected xss in websites☆16Oct 6, 2018Updated 7 years ago
- [discontinued] Mass exploiter of CVE-2015-1579 for WordPress CMS☆28May 21, 2018Updated 7 years ago
- BLACKBOx Penetration Testing Framework☆31Dec 20, 2018Updated 7 years ago
- FAST SIMPLE SMOOTH CMS CHECKER Multi thread~☆13May 16, 2018Updated 7 years ago
- Unlimited Reverse IP Lookup using hackertarget.com API.☆35Aug 3, 2020Updated 5 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Dec 9, 2016Updated 9 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆60Aug 7, 2014Updated 11 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- SMS Phishing Tools☆79Jul 19, 2017Updated 8 years ago
- Find exploitable PHP files by parameter fuzzing and function call tracing☆72Jan 24, 2017Updated 9 years ago
- It is a Python+Perl script to exploit ASP.net Padding Oracle vulnerability.☆18Aug 2, 2016Updated 9 years ago
- Improved DOS exploit for wordpress websites (CVE-2018-6389)☆127Oct 1, 2020Updated 5 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆47Mar 22, 2017Updated 8 years ago
- 本文原文由知名 Hacker Eric S. Raymond 所撰寫,教你如何正確的提出技術問題並獲得你滿意的答案。☆13Sep 25, 2020Updated 5 years ago
- Obfuscate specific windows apis with different apis☆12Jul 31, 2024Updated last year
- check cmd execute☆14Feb 4, 2017Updated 9 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Auto CMS detector☆11Dec 29, 2017Updated 8 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- Automated tool to find backup files that may disclose a website's source code☆20Oct 13, 2022Updated 3 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- Honeypot for router backdoor (TCP 32764)☆19Feb 6, 2014Updated 12 years ago
- Miscellaneous exploit code☆1,568Oct 6, 2023Updated 2 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33May 28, 2019Updated 6 years ago
- Just some random stuff for AppLocker☆18Jan 30, 2019Updated 7 years ago
- Drupal Exploiter Tool (Drupal Hunter)☆37Apr 29, 2018Updated 7 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Sep 18, 2019Updated 6 years ago