This will give you shell access on the target system if redis server is not configured properly and faced on the internet without any authentication
☆97Jan 2, 2020Updated 6 years ago
Alternatives and similar repositories for Redis-Server-Exploit
Users that are interested in Redis-Server-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- ☆42Jan 19, 2023Updated 3 years ago
- Windows Enumeration and Privilege Escalation Script☆18Nov 1, 2019Updated 6 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Sep 20, 2014Updated 11 years ago
- Using this script, you can enumerate Usernames and passwords of Nosql(mongodb) injecion vulnerable web applications.☆173Nov 29, 2019Updated 6 years ago
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆40Jul 28, 2018Updated 7 years ago
- Some handy scripts to collect hosts installed redis (using Shodan search engine) and exploit them☆33Sep 4, 2016Updated 9 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- ☆10Jun 29, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Challenges of the alpha ctf 2022☆13Jan 4, 2024Updated 2 years ago
- ☆126Oct 28, 2021Updated 4 years ago
- Revisiting a classic tool, the file pumper! 💦☆15Apr 16, 2020Updated 6 years ago
- ☆12Jun 30, 2017Updated 8 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- PoC for CVE-2021-3129 (Laravel)☆12Oct 9, 2021Updated 4 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Tiny read-only unlocker for MS Office documents☆12Aug 18, 2021Updated 4 years ago
- Some of the best web shells that you might need!☆348Jun 30, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆37Dec 3, 2020Updated 5 years ago
- A Linux enumeration script for Hack The Box☆191Nov 27, 2019Updated 6 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- Simple Nmap XML parsing script. Doesn't do anything fancy☆22Oct 22, 2020Updated 5 years ago
- your bestfried for finding LinkedIn Employees on github☆15Mar 28, 2023Updated 3 years ago
- Nmap NSE script for enumerate indices, plugins and cluster nodes on an elasticsearch target☆42Apr 17, 2021Updated 5 years ago
- WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit☆52Sep 26, 2019Updated 6 years ago
- ☆16Oct 26, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- ☆27Apr 22, 2025Updated last year
- Dump stuff without touching disk☆165Oct 29, 2020Updated 5 years ago
- cbftp - the final FTP client☆17Apr 18, 2026Updated 2 weeks ago
- Tools, utilities and scripts to help you write redis modules!☆299Jun 20, 2024Updated last year
- Various scripts & tools☆12Apr 22, 2024Updated 2 years ago