grav3m1nd-byte / werkzeug-pinLinks
Yet another Werkzeug Console Pin Exploit Explanation
☆20Updated 3 years ago
Alternatives and similar repositories for werkzeug-pin
Users that are interested in werkzeug-pin are comparing it to the libraries listed below
Sorting:
- ☆21Updated 3 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆29Updated 6 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 4 months ago
- Creates a malicious ODF document help leak NetNTLM Creds☆31Updated last year
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆25Updated 4 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 4 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- C# .Net Framework program that uses RunspaceFactory for Powershell command execution.☆18Updated 2 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆41Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Check robustness of your (their) Active Directory accounts passwords☆35Updated 3 months ago
- ☆31Updated 4 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆21Updated 3 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Journey so Far☆24Updated 3 years ago
- ☆45Updated 8 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆23Updated 5 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12Updated 2 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆27Updated 2 years ago
- Command line client for HackTheBox☆22Updated last year
- ☆16Updated 6 years ago
- A list of weird comparison in SQL☆15Updated 3 years ago