grav3m1nd-byte / werkzeug-pinLinks
Yet another Werkzeug Console Pin Exploit Explanation
☆20Updated 3 years ago
Alternatives and similar repositories for werkzeug-pin
Users that are interested in werkzeug-pin are comparing it to the libraries listed below
Sorting:
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆11Updated 4 years ago
- ☆31Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 5 months ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Repo for OSWE related video content for @SecAura Youtube Channel☆34Updated 3 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆29Updated 6 years ago
- ☆34Updated 3 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆21Updated 3 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆16Updated last year
- ☆16Updated 6 years ago
- Vulnerable Windows Application☆17Updated last year
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- Get all NetNTLM Hashes via Different zero-click Methodologies from LLMNR Poisoning☆18Updated 3 years ago
- Custom queries list for BloodHound☆28Updated 10 months ago
- ☆21Updated 3 years ago
- Notes for CRTP☆41Updated 4 years ago
- C# .Net Framework program that uses RunspaceFactory for Powershell command execution.☆18Updated 2 years ago
- BurpSuite extension to convert requests into bcheck scripts☆32Updated last year
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- ☆20Updated 3 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12Updated 2 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 5 months ago
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆23Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆39Updated last year
- ☆34Updated 3 years ago