hannob / fpmvulnLinks
bash poc scripts to exploit open fpm ports
☆60Updated 5 years ago
Alternatives and similar repositories for fpmvuln
Users that are interested in fpmvuln are comparing it to the libraries listed below
Sorting:
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Updated 5 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- ☆19Updated 4 years ago
- URL-encode data streams via commandline☆14Updated 5 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- Microsoft Applocker evasion tool☆39Updated 5 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆15Updated 5 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- F# Implementation to spawn shellcode☆47Updated 6 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 4 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 6 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆94Updated 2 years ago
- ☆20Updated 5 years ago
- This is a Burp extension for adding additional payloads to active scanner that require out-of-band validation. Works great with XSSHunter☆20Updated 8 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆53Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- UglyEXe - bypass some AVs☆17Updated 5 years ago
- ☆30Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago
- Zoom Persistence Aggressor and Handler☆55Updated 4 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 7 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago