dionach / pgexecLinks
Script and resources to execute shell commands using access to a PostgreSQL service
☆69Updated 8 years ago
Alternatives and similar repositories for pgexec
Users that are interested in pgexec are comparing it to the libraries listed below
Sorting:
- Parse NTLM challenge messages over HTTP and SMB☆150Updated 2 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆63Updated 6 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆204Updated 2 years ago
- CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13☆65Updated 5 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆172Updated 5 years ago
- SAP Gateway RCE exploits☆156Updated 4 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 5 years ago
- Scripts created to help with post exploitation of a Windows host☆99Updated 4 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆223Updated 5 years ago
- Example Vulnerable .NET HTTP Remoting☆86Updated 6 years ago
- A malicious LDAP server for JNDI injection attacks☆75Updated 9 months ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- mRemoteNG Config File Decrypt☆86Updated 2 years ago
- This Repository contains the stuff related to windows Active directory environment exploitation☆152Updated 2 years ago
- Proof-of-concept code for various bugs☆111Updated 9 months ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆81Updated 4 years ago
- ☆45Updated 8 years ago
- PEAS is a Python 2 library and command line application for running commands on an ActiveSync server e.g. Microsoft Exchange.☆181Updated 2 years ago
- Gogs CVEs☆78Updated 5 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆90Updated 5 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Updated 5 years ago
- RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer☆56Updated 5 years ago
- Slides and Code for the BHUSA 2019 talk: Flying a False Flag☆236Updated 5 years ago
- Exploitation toolkit for RichFaces☆104Updated last year
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆168Updated 3 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆121Updated 5 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Updated 4 years ago
- ☆51Updated 3 years ago
- siberas JMX exploitation toolkit☆131Updated 2 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆69Updated 6 months ago