iss4cf0ng / Tyrant
PHP DDoS/Stress Test
☆10Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Tyrant
- Ruijie-RG-EW1200G CVE-2023-4169_CVE-2023-3306_CVE-2023-4415☆27Updated last year
- Multifunctional open redirection vulnerability scanner.☆30Updated 2 years ago
- CVE-2023-46604 ActiveMQ RCE vulnerability verification/exploitation tool☆35Updated 11 months ago
- 免杀捆绑器,过国内主流杀软。A Bundler bypass anti-virus☆12Updated 9 months ago
- Remote administration tool with native client☆32Updated last year
- CHAOS RAT web panel path RCE PoC☆29Updated 6 months ago
- CVE-2022-26134 - Pre-Auth Remote Code Execution via OGNL Injection☆3Updated 2 years ago
- Python Script to exploit Zimbra Auth Bypass + RCE (CVE-2022-27925)☆4Updated 2 years ago
- fofa一键抓取目标并批量攻击☆10Updated 3 years ago
- 一个集和多线程 批量验证 poc验证 存活测试 备份文件探测 后台探测 渗透测试框架。☆15Updated 2 years ago
- Simple command-line webshell that executes commands via the HTTP request in order to avoid any WAF or IDS while bypassing disable_functio…☆58Updated 7 months ago
- cs loader,bypassav, 分离免杀某60,某绒☆10Updated 11 months ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆43Updated last year
- System of Pekalongan Webshell V2☆10Updated 5 months ago
- SQL injector vulnerability scanner and exploiter along with sqli dork scanner☆13Updated 2 years ago
- Simple python script for brute force attack to smtp users☆13Updated 7 months ago
- Hikvision log4j PoC☆65Updated last year
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Updated 2 years ago
- 🐱🏍红队小工具 | 自己编写的渗透中使用的各种脚本☆15Updated last year
- Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit☆12Updated 2 years ago
- CVE-2024-21893 to CVE-2024-21887 Exploit Toolkit☆25Updated 9 months ago
- exploit for cve-2023-47246 SysAid RCE (shell upload)☆52Updated 11 months ago
- Powershell shellcode one-liner. Powershell免杀一句话上线器便捷生成☆52Updated last year
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆33Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆20Updated last year
- 51Pwn Platform,为黑客而生的大数据搜索引擎,Big data search engine born for hackers☆27Updated 3 weeks ago
- ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!!☆97Updated 3 months ago