h4ppy7ree / linux-exploit-suggesterLinks
Linux privilege escalation auditing tool
☆11Updated 7 years ago
Alternatives and similar repositories for linux-exploit-suggester
Users that are interested in linux-exploit-suggester are comparing it to the libraries listed below
Sorting:
- ☆22Updated 8 years ago
- Veil's PowerTools are a collection of PowerShell projects with a focus on offensive operations.☆99Updated 10 years ago
- Weblogic-CVE-2018-3191远程代码命令执行漏洞☆66Updated 6 years ago
- CVE-2019-3396 confluence SSTI RCE☆174Updated 4 years ago
- CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script☆139Updated 6 years ago
- CVE-2018-3245-PoC☆167Updated 3 years ago
- java unserialize vul for weblogic exploit☆175Updated 6 years ago
- cobaltstrike xor64.bin补完计划☆135Updated 6 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Updated 6 years ago
- Apache Solr RCE (ENABLE_REMOTE_JMX_OPTS="true")☆102Updated 5 years ago
- CVE-2018-2893-PoC☆103Updated 6 years ago
- Creates a SOCK proxy server that transmits data over an SSRF vulnerability☆114Updated 12 years ago
- Apache Tomcat Remote Code Execution on Windows☆187Updated 5 years ago
- Powershell攻击指南----黑客后渗透之道☆29Updated 7 years ago
- A collection of open source and commercial tools that aid in red team operations.☆36Updated 7 years ago
- Weblogic Upload Vuln(Need username password)-CVE-2019-2618☆173Updated 6 years ago
- This is JSRat.ps1 in Python☆143Updated 9 years ago
- This is a webshell open source project☆37Updated 10 years ago
- ☆1Updated 3 years ago
- WebLogic Exploit☆142Updated 6 years ago
- Weblogic 反序列化漏洞(CVE-2018-2628)☆105Updated 5 years ago
- A tool that checks and downloads scripts that will aid with privilege escalation on a Windows system.☆170Updated 9 years ago
- CVE 2017-9805☆60Updated 4 years ago
- Some codes for bypassing Oracle WebLogic CVE-2018-2628 patch☆114Updated 7 years ago
- Reverse Shell as a Service☆66Updated 4 years ago
- XSS_Filter_Evasion_Cheat_Sheet 中文版☆78Updated 11 years ago
- 一些漏洞总结。☆12Updated 6 years ago
- QAQ Just study unserialize vulnerabilities in Java :)☆196Updated 6 years ago
- 配合reGeorg使用的内网扫描工具☆62Updated 8 years ago
- CVE-2018-8174_python☆140Updated 3 years ago