xdebug reverse shell
☆22Jan 18, 2018Updated 8 years ago
Alternatives and similar repositories for xdebug-shell
Users that are interested in xdebug-shell are comparing it to the libraries listed below
Sorting:
- ☆12Oct 16, 2017Updated 8 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Exploits Oracle 9i XDB ftp password buffer overflow vulnerability☆11Jun 27, 2015Updated 10 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Jan 17, 2018Updated 8 years ago
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Some minor changes to Chimichurri to get it to compile on modern machines☆44Jun 22, 2015Updated 10 years ago
- ☆17May 29, 2015Updated 10 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- Proof of concept exploit for CVE-2017-3599☆23Apr 18, 2017Updated 8 years ago
- Collections of tools, scripts, snippets and so on, used in Rev3rse Security Live☆24Dec 4, 2018Updated 7 years ago
- Port scanning and domain utility.☆29Sep 8, 2017Updated 8 years ago
- ☆37Feb 12, 2018Updated 8 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆32Jul 18, 2017Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 8 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29May 7, 2017Updated 8 years ago
- ios source grepper☆42May 4, 2017Updated 8 years ago
- Weaponising C# - Fundamentals Training Content☆70May 11, 2021Updated 4 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Script for turning a Raspberry Pi into a Honey Pot Pi☆35Sep 25, 2024Updated last year
- Powerful script for logical obfuscation of powershell scripts☆29Mar 7, 2019Updated 6 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- Some works on Nmap Scripts (NSE)☆89Jun 2, 2024Updated last year
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Linux pentest tools☆89Nov 4, 2019Updated 6 years ago
- cewl wordlist generator from https://digi.ninja/projects/cewl.php☆29Jul 3, 2015Updated 10 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Feb 15, 2017Updated 9 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- A Upnp exploitation tool.☆106Oct 27, 2019Updated 6 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Social Engineering for the Blue Team☆11Feb 1, 2024Updated 2 years ago
- ☆12Jun 13, 2016Updated 9 years ago