hannob / fpmvulnView external linksLinks
bash poc scripts to exploit open fpm ports
☆59Jul 31, 2019Updated 6 years ago
Alternatives and similar repositories for fpmvuln
Users that are interested in fpmvuln are comparing it to the libraries listed below
Sorting:
- Explore and filter your GitHub starred repositories☆25Dec 5, 2023Updated 2 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- ThinkPHP6任意文件操作漏洞,影响版本ThinkPHP6.0.0-6.0.1☆22Jan 15, 2020Updated 6 years ago
- Powershell and python utilties for Entra Connect☆27Jun 5, 2025Updated 8 months ago
- notorious BIG IP☆15Aug 8, 2019Updated 6 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Dec 21, 2020Updated 5 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆35Jan 8, 2021Updated 5 years ago
- This repository contains a framework of curated Azure penetration testing tools that are specifically designed to help you identify and m…☆22May 13, 2023Updated 2 years ago
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- A tool for sorting blocks of lines☆37Oct 4, 2022Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Jun 20, 2022Updated 3 years ago
- CVE-2019-12384 漏洞测试环境☆21Nov 16, 2022Updated 3 years ago
- Zone transfers for rwhois☆20Feb 27, 2019Updated 6 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 4 years ago
- ☆10Jun 26, 2024Updated last year
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Rust procedural macro to insert a few asm! calls full of junk instructions in between every line of code.☆13May 27, 2023Updated 2 years ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Feb 4, 2021Updated 5 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- Oneliners curated from my experience and from the internet☆23Feb 8, 2021Updated 5 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Aug 19, 2020Updated 5 years ago
- Collection of useful command line commands☆14Dec 10, 2021Updated 4 years ago
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆15Oct 16, 2024Updated last year
- ☆11Jul 28, 2020Updated 5 years ago
- Quick tool to create custom wordlists like how fuzzers work☆10Sep 29, 2023Updated 2 years ago
- 10 Reset Password Flaws Based on Web Application Security☆11Oct 19, 2020Updated 5 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 8 months ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- CTF Writeups☆12Feb 25, 2023Updated 2 years ago
- Work In progress to capture all sorts of data transaction on any Platform supported by Frida.☆11Jan 15, 2023Updated 3 years ago
- ☆12Sep 23, 2023Updated 2 years ago