An implementation of NSA's ExplodingCan exploit in Python
☆270Jan 4, 2018Updated 8 years ago
Alternatives and similar repositories for explodingcan
Users that are interested in explodingcan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 9 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- iis6 exploit 2017 CVE-2017-7269☆92Feb 4, 2023Updated 3 years ago
- These are exploits created to avoid the use of Metasploit. While studying for OSCP in the Offsec labs, VHL, Vulnhub, etc, I tried to find…☆31Jul 31, 2025Updated 9 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆259Mar 9, 2021Updated 5 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- Changes for Visual Studio 2013☆120Jun 22, 2015Updated 10 years ago
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 5 years ago
- This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP …☆11Nov 3, 2020Updated 5 years ago
- Exploit for PlaySMS 1.4 authenticated RCE☆14Nov 6, 2018Updated 7 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆37Dec 3, 2020Updated 5 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆2,005Oct 10, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Avoidz tool to bypass most A.V softwares☆140Sep 28, 2017Updated 8 years ago
- Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)☆597Jan 8, 2021Updated 5 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆253Sep 27, 2023Updated 2 years ago
- ☆11Apr 18, 2018Updated 8 years ago
- Updating MS08-067 Python exploit script☆105Aug 18, 2018Updated 7 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆129Sep 16, 2022Updated 3 years ago
- Some scripts and exploits☆148Jul 9, 2018Updated 7 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆49May 29, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Jackson Rce For CVE-2019-12384☆102Jul 24, 2019Updated 6 years ago
- offsec batteries included☆1,614Mar 11, 2024Updated 2 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Dec 27, 2022Updated 3 years ago
- Exploit for Drupal 7 <= 7.57 CVE-2018-7600☆140Apr 26, 2018Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Test for SSL heartbeat vulnerability (CVE-2014-0160)☆168Jul 10, 2014Updated 11 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,672Nov 28, 2020Updated 5 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆944May 8, 2019Updated 7 years ago
- ☆1,201Apr 23, 2017Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- locate and attack Lync/Skype for Business☆345Oct 1, 2024Updated last year
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- MS17-010☆2,246Jun 20, 2023Updated 2 years ago
- A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe.☆1,423Jan 19, 2024Updated 2 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆110Aug 21, 2018Updated 7 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago