☆18Jul 9, 2020Updated 5 years ago
Alternatives and similar repositories for WebMin-1.890-Exploit-unauthorized-RCE
Users that are interested in WebMin-1.890-Exploit-unauthorized-RCE are comparing it to the libraries listed below
Sorting:
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- ☆54Jun 1, 2024Updated last year
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Dec 13, 2020Updated 5 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32May 10, 2018Updated 7 years ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 3 months ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34May 18, 2020Updated 5 years ago
- ☆10Oct 9, 2024Updated last year
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- ☆10Jul 8, 2024Updated last year
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- blame Huy☆42Jan 3, 2021Updated 5 years ago
- Python script for exploiting Werkzeug Debug RCE useful for CTF☆39Feb 18, 2020Updated 6 years ago
- C# Data Collector for the BloodHound Project, Version 3☆37Dec 28, 2021Updated 4 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- ☆11Nov 5, 2025Updated 4 months ago
- A powerful command-line interface for Perplexity AI with ultra-fast RAG capabilities. Built with ❤️ for developers who need lightning-fas…☆22Dec 28, 2025Updated 2 months ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- ☆11Apr 2, 2022Updated 3 years ago
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- Maltego transforms for the Steam community☆12Aug 5, 2017Updated 8 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Open-source drop-in replacement for IOUlive (written in C)☆24Dec 4, 2011Updated 14 years ago
- Hacking the HooToo HT-TM05☆13Dec 22, 2022Updated 3 years ago
- A repository hosting some of my own vulnerability reports and proof-of-concepts.☆15Aug 8, 2019Updated 6 years ago
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆44Dec 27, 2018Updated 7 years ago
- F5 BIG-IP unauthenticated remote code execution (RCE) and authentication bypass vulnerability!☆11Oct 30, 2023Updated 2 years ago
- game of active directory (SnapLabs version)☆15Aug 12, 2025Updated 6 months ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 5 years ago