cybervaca / CVE-2020-8816Links
Pi-hole Remote Code Execution authenticated Version >= 4.3.2
☆11Updated 5 years ago
Alternatives and similar repositories for CVE-2020-8816
Users that are interested in CVE-2020-8816 are comparing it to the libraries listed below
Sorting:
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Updated 6 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Pentesting resources☆23Updated 6 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 8 years ago
- interact with HackTheBox from your terminal☆24Updated 6 years ago
- A dockerized, improved version of the Impacket smbserver.py☆40Updated 6 years ago
- Setup Kali XFCE version with some hi-dpi friendly style☆32Updated 6 years ago
- My pentest cheat sheet☆15Updated 8 years ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- cve-2018-10933 libssh authentication bypass☆109Updated 7 years ago
- Terribad PrivEsc enumeration script for Windows systems☆15Updated 5 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆67Updated 5 years ago
- Automatically spin up infra for phishing☆64Updated 5 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32Updated 7 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 3 years ago
- A small cli utility for interacting with Hack the Box☆35Updated 2 years ago
- Game of Thrones hacking CTF (Capture the flag)☆63Updated 7 months ago
- Effectively search the Exploit-DB☆16Updated 5 years ago
- Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container☆14Updated 7 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 11 months ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- ☆36Updated 7 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- ☆53Updated last year
- Helper scripts to assist penetration testing and exploit development☆35Updated 10 months ago
- API testing tool written with Python☆56Updated 8 years ago