These are exploits created to avoid the use of Metasploit. While studying for OSCP in the Offsec labs, VHL, Vulnhub, etc, I tried to find ways to limit my use of Metasploit and Meterpreter shells.
☆32Jul 31, 2025Updated 8 months ago
Alternatives and similar repositories for webdav-exploit
Users that are interested in webdav-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Enumeration and Privilege Escalation Script☆18Nov 1, 2019Updated 6 years ago
- This is a Terminal Custom Color Pallet based off the colors used from Defcon27☆14Jul 23, 2020Updated 5 years ago
- php - asp - aspx☆26Jan 10, 2018Updated 8 years ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- OSCP license passed successfully, notes made before the exam☆26Apr 26, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This is a Java program that exploits Spring Break vulnerability (CVE-2017-8046).☆17Jun 4, 2021Updated 4 years ago
- Vulnerabilities, security advisories, exploit codes and proof-of-concept codes.☆10Mar 1, 2026Updated last month
- ☆45Aug 27, 2024Updated last year
- Handbook and survival guide for hacking over the wire, OSCP-style☆43Nov 2, 2020Updated 5 years ago
- EH-Bble☆10Jul 23, 2019Updated 6 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- [S]imple [T]actical [A]gent [R]elay: A peer-to-peer C2-ish framework for Ethical Hackers and Security Researchers.☆31Jan 8, 2026Updated 3 months ago
- ☆10Aug 6, 2019Updated 6 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆483Aug 4, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- WaniCTF 2020 official writeup & source code☆11Oct 18, 2021Updated 4 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- Python template to assist with buffer overflows☆73Nov 12, 2019Updated 6 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Jun 26, 2019Updated 6 years ago
- ☆510May 27, 2018Updated 7 years ago
- Offensive tool for Active Directory reconnaissance☆12Jan 28, 2026Updated 2 months ago
- ☆19Sep 9, 2025Updated 7 months ago
- Designed for automated enumeration for ethical hacking and penetration testing☆46Sep 28, 2022Updated 3 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Simple php reverse shell implemented using binary .☆442Nov 17, 2023Updated 2 years ago
- Penetration Testing with Kali Linux☆22Oct 18, 2019Updated 6 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 5 months ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- My solutions and writeups for the CTF challenges hosted @ backdoor.sdslabs.co☆10Oct 23, 2017Updated 8 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 8 months ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆934Jan 6, 2025Updated last year
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- LotusCMS 3.0 eval() Remote Command Execution☆14Feb 10, 2013Updated 13 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆566Aug 17, 2020Updated 5 years ago
- Collection of things made during my OSCP journey☆954Feb 24, 2022Updated 4 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- HTTP request smuggling tools☆18Aug 17, 2020Updated 5 years ago
- This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP …☆11Nov 3, 2020Updated 5 years ago
- ☆200Jan 19, 2020Updated 6 years ago