A PoC that shows that Web Vulnerabilities can indeed be interesting
☆20Mar 27, 2018Updated 7 years ago
Alternatives and similar repositories for race2rce
Users that are interested in race2rce are comparing it to the libraries listed below
Sorting:
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Nov 2, 2013Updated 12 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- super-Django-CC is a simle web interface for commoncrawl.org☆15Dec 8, 2022Updated 3 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- 使用JS监听获取dz密码☆12Sep 5, 2017Updated 8 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Mar 23, 2018Updated 7 years ago
- Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit☆20Jun 19, 2019Updated 6 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- Go (golang) client library for the Dropbox core and Datastore API with support for uploading and downloading encrypted files.☆12May 22, 2017Updated 8 years ago
- ☆15Jul 5, 2019Updated 6 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Feb 24, 2019Updated 7 years ago
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- CVE-2018-3191 反弹shell☆16Oct 23, 2018Updated 7 years ago
- GNU/Linux version of the https://github.com/inquisb/icmpsh slave☆22Feb 11, 2020Updated 6 years ago
- Packer and vagrant scripts to automate building Windows and Linux machines on vCenter☆17Jul 7, 2019Updated 6 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- ☆21Dec 1, 2019Updated 6 years ago
- ☆18Dec 24, 2018Updated 7 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- A regular expression fuzzer.☆45Mar 13, 2018Updated 7 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Sep 13, 2017Updated 8 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- Exploits backed up from http://1337day.com in the 2011☆20Jan 27, 2021Updated 5 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- Collection of tools that aid in red team operations☆25Aug 23, 2018Updated 7 years ago
- ☆25Jul 5, 2018Updated 7 years ago