dionach / pgexecLinks
Script and resources to execute shell commands using access to a PostgreSQL service
☆69Updated 8 years ago
Alternatives and similar repositories for pgexec
Users that are interested in pgexec are comparing it to the libraries listed below
Sorting:
- Parse NTLM challenge messages over HTTP and SMB☆151Updated 2 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆64Updated 6 years ago
- CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13☆65Updated 6 years ago
- Scripts created to help with post exploitation of a Windows host☆99Updated 4 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 5 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆204Updated 2 years ago
- mRemoteNG Config File Decrypt☆89Updated 3 years ago
- A malicious LDAP server for JNDI injection attacks☆75Updated 11 months ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆171Updated 5 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Updated 5 years ago
- SAP Gateway RCE exploits☆156Updated 5 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆81Updated 4 years ago
- This Repository contains the stuff related to windows Active directory environment exploitation☆152Updated 2 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆122Updated 5 years ago
- ☆51Updated 3 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆180Updated 2 years ago
- PEAS is a Python 2 library and command line application for running commands on an ActiveSync server e.g. Microsoft Exchange.☆183Updated 2 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆90Updated 5 years ago
- ☆46Updated 8 years ago
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆177Updated 5 years ago
- RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer☆56Updated 5 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Updated 3 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆168Updated 3 years ago
- Example Vulnerable .NET HTTP Remoting☆85Updated 6 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆226Updated 5 years ago
- Argument Injection in Dragonfly Ruby Gem☆16Updated 4 years ago
- Proof of concept for CVE-2020-5902☆72Updated 5 years ago
- ☆197Updated 5 years ago
- Exploitation toolkit for RichFaces☆105Updated last year