dionach / pgexecLinks
Script and resources to execute shell commands using access to a PostgreSQL service
☆70Updated 8 years ago
Alternatives and similar repositories for pgexec
Users that are interested in pgexec are comparing it to the libraries listed below
Sorting:
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆66Updated 7 years ago
- Parse NTLM challenge messages over HTTP and SMB☆149Updated 3 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆206Updated 2 years ago
- CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13☆66Updated 6 years ago
- mRemoteNG Config File Decrypt☆92Updated 3 years ago
- Scripts created to help with post exploitation of a Windows host☆99Updated 4 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 5 years ago
- RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer☆56Updated 6 years ago
- A malicious LDAP server for JNDI injection attacks☆76Updated last year
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆171Updated 5 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Updated 5 years ago
- This Repository contains the stuff related to windows Active directory environment exploitation☆153Updated 2 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆135Updated 6 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Updated 5 years ago
- ☆51Updated 3 years ago
- SAP Gateway RCE exploits☆157Updated 5 years ago
- SNMP data gather scripts☆84Updated last year
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆180Updated 5 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆169Updated 3 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆229Updated 5 years ago
- Example Vulnerable .NET HTTP Remoting☆87Updated 6 years ago
- ☆46Updated 8 years ago
- Loads a custom dll in system32 via diaghub.☆82Updated 5 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆122Updated 6 years ago
- Slides and Code for the BHUSA 2019 talk: Flying a False Flag☆239Updated 6 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆82Updated 4 years ago
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆184Updated 3 years ago
- PEAS is a Python 2 library and command line application for running commands on an ActiveSync server e.g. Microsoft Exchange.☆184Updated 3 years ago
- Exploitation toolkit for RichFaces☆106Updated 2 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆181Updated 2 years ago