blu0 / webdav-exploitLinks
These are exploits created to avoid the use of Metasploit. While studying for OSCP in the Offsec labs, VHL, Vulnhub, etc, I tried to find ways to limit my use of Metasploit and Meterpreter shells.
☆30Updated last month
Alternatives and similar repositories for webdav-exploit
Users that are interested in webdav-exploit are comparing it to the libraries listed below
Sorting:
- Simple script to generate commands to achieve reverse shells.☆120Updated 4 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- ☆47Updated 8 years ago
- Python template to assist with buffer overflows☆72Updated 5 years ago
- ☆83Updated 5 years ago
- Windows Kernel Exploits☆65Updated 8 years ago
- 👹☆56Updated 4 years ago
- Changes for Visual Studio 2013☆119Updated 10 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- ☆137Updated 8 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆65Updated 4 years ago
- ☆155Updated 8 years ago
- ☆104Updated 5 years ago
- ☆146Updated 5 years ago
- ☆37Updated 6 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆254Updated 2 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆31Updated 5 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆233Updated 5 years ago
- Collection of things made during my OSCP journey☆264Updated 7 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆47Updated 10 years ago
- Ultimate File Transfer List☆62Updated 2 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 5 years ago
- A Linux enumeration script for Hack The Box☆191Updated 5 years ago
- OSCP Buffer Overflow in 30 minutes☆36Updated 6 years ago
- ☆31Updated 5 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆63Updated 5 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆146Updated 4 years ago
- Powershell crazy and sometimes diabolic scripts☆159Updated 5 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆102Updated last year
- Reverse Shell-able Windows exploits short POCs.☆32Updated 4 years ago