cyrus-and / mysql-unsha1
Authenticate against a MySQL server without knowing the cleartext password
☆226Updated 2 years ago
Alternatives and similar repositories for mysql-unsha1:
Users that are interested in mysql-unsha1 are comparing it to the libraries listed below
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 7 years ago
- An exploit for Apache Struts CVE-2018-11776☆301Updated 6 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆390Updated 7 years ago
- An exploit for Apache Struts CVE-2017-9805☆249Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆489Updated 3 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆316Updated 6 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆356Updated 2 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 8 years ago
- Password lists obtained from strangers attempting to log in to my server.☆222Updated 6 years ago
- Panoptic is an open source penetration testing tool that automates the process of search and retrieval of content for common log and conf…☆313Updated 3 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 8 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆306Updated 7 years ago
- A code demonstrating CVE-2018-0886☆264Updated 4 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆424Updated 5 years ago
- St2-057 Poc Example☆313Updated 6 years ago
- ☆206Updated 3 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- Automated Responder/secretsdump.py cracking☆182Updated 8 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆319Updated 7 years ago
- Running CVE-2017-8759 exploit sample.☆255Updated 5 years ago
- Repository holding all alternatives of *nix backdoors.☆153Updated 9 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆597Updated 3 months ago
- Some scripts and exploits☆144Updated 6 years ago
- some pentest scripts & tools by yaseng@uauc.net☆148Updated 5 years ago
- Nameserver DNS poisoning attacks made easy☆518Updated 8 years ago
- ☆232Updated 9 years ago
- CVE-2018-10933 very simple POC☆128Updated 6 years ago