cybervaca / CVE-2020-8816Links
Pi-hole Remote Code Execution authenticated Version >= 4.3.2
☆12Updated 4 years ago
Alternatives and similar repositories for CVE-2020-8816
Users that are interested in CVE-2020-8816 are comparing it to the libraries listed below
Sorting:
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆14Updated 5 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container☆11Updated 7 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 6 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆41Updated 5 years ago
- polymorphic webshells☆30Updated 7 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 7 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆32Updated 6 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- A small cli utility for interacting with Hack the Box☆35Updated 2 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆21Updated 6 months ago
- interact with HackTheBox from your terminal☆24Updated 5 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Updated 5 years ago
- Setup Kali XFCE version with some hi-dpi friendly style☆32Updated 5 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆39Updated 3 months ago
- another nmap summarising script☆26Updated 4 years ago
- Game of Thrones hacking CTF (Capture the flag)☆64Updated 2 months ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆31Updated 7 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 6 months ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- Red Team Resources☆60Updated 6 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆12Updated 6 years ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆22Updated 5 years ago
- ☆21Updated 5 years ago
- Some random exploits that may or may not be useful. Not responsible for misuse.☆21Updated 6 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 8 years ago