These are exploits created to avoid the use of Metasploit. While studying for OSCP in the Offsec labs, VHL, Vulnhub, etc, I tried to find ways to limit my use of Metasploit and Meterpreter shells.
☆32Jul 31, 2025Updated 7 months ago
Alternatives and similar repositories for webdav-exploit
Users that are interested in webdav-exploit are comparing it to the libraries listed below
Sorting:
- Principles of MITRE ATT&CK in the fraud domain☆35Apr 14, 2019Updated 6 years ago
- This is a Terminal Custom Color Pallet based off the colors used from Defcon27☆14Jul 23, 2020Updated 5 years ago
- php - asp - aspx☆26Jan 10, 2018Updated 8 years ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- OSCP license passed successfully, notes made before the exam☆26Apr 26, 2020Updated 5 years ago
- This is a Java program that exploits Spring Break vulnerability (CVE-2017-8046).☆17Jun 4, 2021Updated 4 years ago
- My experiences with Virtual Hacking Labs☆12Feb 7, 2020Updated 6 years ago
- Vulnerabilities, security advisories, exploit codes and proof-of-concept codes.☆10Mar 1, 2026Updated 2 weeks ago
- Handbook and survival guide for hacking over the wire, OSCP-style☆43Nov 2, 2020Updated 5 years ago
- EH-Bble☆10Jul 23, 2019Updated 6 years ago
- Bash script to fully setup your kali system.☆51Dec 31, 2019Updated 6 years ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- Quicksilver Interface☆25May 17, 2009Updated 16 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆482Aug 4, 2020Updated 5 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- Scripts and One-Liners☆20Jan 31, 2025Updated last year
- Exploit for CVE-2018-7600.. called drupalgeddon2,☆11Apr 19, 2018Updated 7 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Jun 26, 2019Updated 6 years ago
- ☆510May 27, 2018Updated 7 years ago
- Offensive tool for Active Directory reconnaissance☆12Jan 28, 2026Updated last month
- ☆19Sep 9, 2025Updated 6 months ago
- Dirtycow exploit for both 32 and 64-bit☆29Jul 23, 2018Updated 7 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆46Sep 28, 2022Updated 3 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- Simple php reverse shell implemented using binary .☆439Nov 17, 2023Updated 2 years ago
- Penetration Testing with Kali Linux☆22Oct 18, 2019Updated 6 years ago
- A reference implementation of a JSON package in Processing.☆49Oct 18, 2013Updated 12 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Parse command line arguments by defining dataclasses☆13Oct 13, 2024Updated last year
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆932Jan 6, 2025Updated last year
- LotusCMS 3.0 eval() Remote Command Execution☆14Feb 10, 2013Updated 13 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆565Aug 17, 2020Updated 5 years ago
- ☆16Dec 2, 2019Updated 6 years ago
- Collection of things made during my OSCP journey☆954Feb 24, 2022Updated 4 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- ☆14May 30, 2018Updated 7 years ago
- This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP …☆11Nov 3, 2020Updated 5 years ago
- Azure AD cheatsheet for the CARTP course☆149May 5, 2022Updated 3 years ago
- ☆200Jan 19, 2020Updated 6 years ago