brosck / NullogLinks
「🧹」Clear logs after an invasion
☆18Updated last year
Alternatives and similar repositories for Nullog
Users that are interested in Nullog are comparing it to the libraries listed below
Sorting:
- OpenSSH 9.1 vulnerability mass scan and exploit☆106Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆62Updated 3 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆92Updated 2 years ago
- ☆79Updated last week
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆60Updated 3 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- Automate converting webshells into reverse shells.☆72Updated 3 weeks ago
- Classic Web shell upload techniques & Web RCE techniques☆61Updated 4 months ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆71Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆77Updated last year
- Red Teaming tools and techniques☆56Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 10 months ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆30Updated 3 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated last year
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆129Updated 5 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆29Updated 2 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- Web Hacking and Red Teaming MindMap☆78Updated last month
- A powerful and delightful PHP WebShell☆67Updated 11 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- ☆90Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Updated 2 years ago
- MOVEit CVE-2023-34362☆139Updated 2 years ago
- ☆105Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆111Updated this week