A PoC that shows that Web Vulnerabilities can indeed be interesting
☆20Mar 27, 2018Updated 7 years ago
Alternatives and similar repositories for race2rce
Users that are interested in race2rce are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- SystemInspector is a script to pull a majority of the security-relevant files and settings from a system.☆18May 22, 2018Updated 7 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit☆20Jun 19, 2019Updated 6 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- Enables Anki Vector to chase a laser pointer☆11Dec 25, 2018Updated 7 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Nov 2, 2013Updated 12 years ago
- ☆14May 6, 2019Updated 6 years ago
- super-Django-CC is a simle web interface for commoncrawl.org☆15Dec 8, 2022Updated 3 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- 使用JS监听获取dz密码☆12Sep 5, 2017Updated 8 years ago
- Converts the Anki/DDL Cozmo robot to more of a Vector robot. He will play, he will chat, he will self charge.☆10May 27, 2020Updated 5 years ago
- Digital feedback management system. we will provide a link to students with their class id and password, and boom within a few minutes th…☆13Nov 27, 2022Updated 3 years ago
- GNU/Linux version of the https://github.com/inquisb/icmpsh slave☆22Feb 11, 2020Updated 6 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Mar 23, 2018Updated 8 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- Backup docker container filesystem, metadata and volume data☆11Mar 28, 2018Updated 7 years ago
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- Go (golang) client library for the Dropbox core and Datastore API with support for uploading and downloading encrypted files.☆12May 22, 2017Updated 8 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- Self contained phish endpoint generator and web server.☆11Mar 5, 2015Updated 11 years ago
- Dashboard designed for monitoring cryptocurrency mining☆20Apr 15, 2023Updated 2 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Learn how to get a reverse shell from JIRA application server☆24Dec 2, 2018Updated 7 years ago
- Check if your code is running on Heroku☆19Jun 21, 2023Updated 2 years ago
- ☆15Jul 5, 2019Updated 6 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Feb 24, 2019Updated 7 years ago
- ☆21Dec 1, 2019Updated 6 years ago