cybervaca / CVE-2020-8816Links
Pi-hole Remote Code Execution authenticated Version >= 4.3.2
☆11Updated 5 years ago
Alternatives and similar repositories for CVE-2020-8816
Users that are interested in CVE-2020-8816 are comparing it to the libraries listed below
Sorting:
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Updated 6 years ago
- interact with HackTheBox from your terminal☆24Updated 6 years ago
- ☆36Updated 7 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- Pentesting resources☆23Updated 6 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- Game of Thrones hacking CTF (Capture the flag)☆63Updated 6 months ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆136Updated 11 months ago
- ☆53Updated last year
- Setup Kali XFCE version with some hi-dpi friendly style☆32Updated 6 years ago
- Red Team Resources☆60Updated 6 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- A small cli utility for interacting with Hack the Box☆35Updated 2 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 6 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 7 years ago
- My pentest cheat sheet☆15Updated 8 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Responder for Python3☆100Updated 6 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- ☆17Updated 10 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆67Updated 5 years ago
- Rogue Access Point Detector☆37Updated last year
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Updated 8 years ago
- Automatically spin up infra for phishing☆64Updated 5 years ago
- Collection of docker containers for security assessments and CTFs. Commandline tool for starting, stopping and managing them.☆25Updated 3 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Updated 5 years ago