gottburgm / ExploitsLinks
Containing Self Made Perl Reproducers / PoC Codes
☆195Updated 5 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below
Sorting:
- Search Exploitable Software on Linux☆231Updated 2 years ago
- Pip install exploit package☆157Updated 6 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆203Updated last year
- POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.☆112Updated 2 years ago
- Linux Privilege Escalation Tool☆184Updated 6 years ago
- Reverse Shell Cheat Sheet TooL☆296Updated 5 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆279Updated 6 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆171Updated 6 years ago
- CVE-2018-6389 Exploit In WordPress DoS☆81Updated 7 years ago
- Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)☆363Updated 5 years ago
- Local File Inclusion Exploitation Tool (mirror)☆127Updated 8 years ago
- SHELLING - a comprehensive OS command injection payload generator☆111Updated 6 years ago
- SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...☆232Updated 5 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆292Updated 2 years ago
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆430Updated last year
- CVE-2018-13379☆254Updated 6 years ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆224Updated last year
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆261Updated 3 months ago
- An implementation of NSA's ExplodingCan exploit in Python☆266Updated 7 years ago
- The Hacker Playbook 3 - Web Commands☆84Updated 7 years ago
- Burp Suite extension to discover assets from HTTP response.☆228Updated 7 months ago
- Script for pentest☆39Updated 4 years ago
- WebLogic Exploit☆142Updated 7 years ago
- Simple python script to extract unsafe functions from php projects☆200Updated 7 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆157Updated 4 years ago
- Bypassing-Web-Application-Firewalls-And-XSS-Filters A series of python scripts for generating weird character combinations and lists for…☆147Updated 4 years ago
- ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container☆138Updated 7 years ago
- A lab for playing with NoSQL Injection☆133Updated 5 years ago
- CVE-2018-7600 - Drupal 7.x RCE☆72Updated 7 years ago
- ☆207Updated 4 years ago