Run remote system commands from Oracle connection - oracle exec command perl
☆12Jun 6, 2015Updated 10 years ago
Alternatives and similar repositories for ora-exec-cmd
Users that are interested in ora-exec-cmd are comparing it to the libraries listed below
Sorting:
- advanced Perl Backdoor☆13Jun 6, 2015Updated 10 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated 2 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 7 years ago
- PoC collection☆13Oct 1, 2020Updated 5 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- poc or exp of some famous vulnerability☆14Mar 5, 2014Updated 11 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- Trigger automated Acunetix scans as part of your web application's build process☆32Aug 9, 2024Updated last year
- ☆17Sep 9, 2022Updated 3 years ago
- Backdoor for Windows systems (client and server) writen in C (client) and ASM (server) using reverse connection☆19Jul 6, 2014Updated 11 years ago
- We store attacks and exploits that we've found useful in our research☆13Jun 4, 2015Updated 10 years ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 7 years ago
- socks5 proxy simplified from shadowsocks.☆71Aug 22, 2013Updated 12 years ago
- 数据库安全审计平台☆64Oct 31, 2018Updated 7 years ago
- interesting analysis☆16May 14, 2018Updated 7 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Nov 28, 2019Updated 6 years ago
- 分布式扫描框架☆61Dec 13, 2015Updated 10 years ago
- Creates a SOCK proxy server that transmits data over an SSRF vulnerability☆114Aug 8, 2012Updated 13 years ago
- ☆20Jan 18, 2024Updated 2 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- TLS SNI virtual hosts bruteforcer☆21Aug 26, 2014Updated 11 years ago
- List of Services (File Sharing, URL shorteners...)☆19Oct 4, 2020Updated 5 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- Web Application Fingerprinting Mindmap☆17Jun 19, 2017Updated 8 years ago
- Java serialization brute force attack tool.☆123Aug 18, 2017Updated 8 years ago
- 背景: https://weibo.com/5084870733/E6GfkarzQ☆21Jun 17, 2017Updated 8 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Apr 23, 2017Updated 8 years ago
- fork from https://sourceforge.net/projects/pam-python ,a linux pam module that you can define your own pam with python scripts. Add examp…☆20Nov 11, 2019Updated 6 years ago
- Graduation Project.☆19Jul 24, 2015Updated 10 years ago
- Compilation of ELF Packers and ELF obfuscation / Anti-Debugging stuff☆21Nov 19, 2017Updated 8 years ago
- Simple SSH brute-forcer written in Go☆24May 29, 2016Updated 9 years ago
- A shell / chat bot for XMPP and cloud services☆49Oct 10, 2015Updated 10 years ago
- lcx in python edition☆28Oct 27, 2017Updated 8 years ago