This script will bruteforce the credential of tomcat manager or host-manager
☆35Jun 24, 2020Updated 5 years ago
Alternatives and similar repositories for Tomcat-Manager-Bruteforce
Users that are interested in Tomcat-Manager-Bruteforce are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GitLab User Enumeration☆62Jan 3, 2025Updated last year
- Joomla login bruteforce☆118Jul 18, 2024Updated last year
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆139Aug 20, 2018Updated 7 years ago
- C# implementation of harmj0y's PowerView☆49Mar 22, 2020Updated 6 years ago
- Loads a custom dll in system32 via diaghub.☆88Mar 16, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆199Jan 12, 2026Updated 3 months ago
- Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion in Python3☆29Feb 27, 2023Updated 3 years ago
- Vulnerability analysis and PoC for the Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (RCE)☆27Sep 4, 2021Updated 4 years ago
- My cyber security notes.☆14Feb 22, 2025Updated last year
- Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)☆166Jun 14, 2018Updated 7 years ago
- Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)☆38May 1, 2018Updated 8 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆234Feb 20, 2020Updated 6 years ago
- Python script to decrypt passwords stored by mRemoteNG☆179Jul 6, 2023Updated 2 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆157Apr 20, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Ultra-fast SNMPv1/v2 stack. Get/set/walk tens of thousands of hosts at once.☆90Sep 8, 2024Updated last year
- linikatz is a tool to attack AD on UNIX☆600Oct 19, 2023Updated 2 years ago
- Extracts Key Values from .keytab files☆359Aug 26, 2020Updated 5 years ago
- Wordlists for creating statistically likely username lists for use in password attacks and security testing. Used for pentesting for over…☆1,319Feb 16, 2026Updated 2 months ago
- WhiteWinterWolf's PHP web shell☆774Dec 2, 2017Updated 8 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆961Apr 20, 2022Updated 4 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆49May 29, 2015Updated 10 years ago
- Username enumeration and password spraying tool aimed at Microsoft O365.☆997Nov 6, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆37Jul 31, 2024Updated last year
- Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)☆1,099Jul 5, 2021Updated 4 years ago
- Contains all the scripts and sample apps related to android in app protections.☆42Apr 19, 2026Updated 3 weeks ago
- socks4 reverse proxy for penetration testing☆648Jul 12, 2018Updated 7 years ago
- ☆18Dec 23, 2024Updated last year
- Capcom Rootkit POC☆213Mar 5, 2017Updated 9 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆358Oct 22, 2024Updated last year
- My script to Prepare for the OSCP exam.I write some useful script by own or refere others and modify☆17Oct 24, 2021Updated 4 years ago
- A semi-interactive PHP shell compressed into a single file.☆1,065Feb 14, 2018Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Updating MS08-067 Python exploit script☆105Aug 18, 2018Updated 7 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,768Dec 18, 2021Updated 4 years ago
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,658Sep 3, 2023Updated 2 years ago
- Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop☆1,261Nov 2, 2022Updated 3 years ago
- POC for netdata ndsudo vulnerability - CVE-2024-32019☆21Aug 3, 2025Updated 9 months ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆407Jun 6, 2020Updated 5 years ago
- ☆49Dec 28, 2023Updated 2 years ago