This will give you shell access on the target system if redis server is not configured properly and faced on the internet without any authentication
☆97Jan 2, 2020Updated 6 years ago
Alternatives and similar repositories for Redis-Server-Exploit
Users that are interested in Redis-Server-Exploit are comparing it to the libraries listed below
Sorting:
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- ☆41Jan 19, 2023Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Windows Enumeration and Privilege Escalation Script☆18Nov 1, 2019Updated 6 years ago
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Sep 20, 2014Updated 11 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆40Jul 28, 2018Updated 7 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- Simple Nmap XML parsing script. Doesn't do anything fancy☆21Oct 22, 2020Updated 5 years ago
- Revisiting a classic tool, the file pumper! 💦☆16Apr 16, 2020Updated 5 years ago
- Using this script, you can enumerate Usernames and passwords of Nosql(mongodb) injecion vulnerable web applications.☆173Nov 29, 2019Updated 6 years ago
- ☆127Oct 28, 2021Updated 4 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Dec 3, 2020Updated 5 years ago
- ☆59Aug 11, 2023Updated 2 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- Nmap NSE script for enumerate indices, plugins and cluster nodes on an elasticsearch target☆42Apr 17, 2021Updated 4 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Various scripts & tools☆12Apr 22, 2024Updated last year
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Ransomware programado en Python☆10Oct 8, 2020Updated 5 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 4 months ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆134Aug 14, 2023Updated 2 years ago
- Keylogger that sends Email at a specific time☆10Apr 7, 2018Updated 7 years ago
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- Experimental kernel-level remote shell based on ICMP content☆15Aug 26, 2020Updated 5 years ago
- Tiny read-only unlocker for MS Office documents☆12Aug 18, 2021Updated 4 years ago
- WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit☆51Sep 26, 2019Updated 6 years ago
- A shortlist of core ServiceNow tables.☆15Oct 16, 2023Updated 2 years ago
- ☆13Jun 30, 2017Updated 8 years ago
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- Smart Install Exploitation Tool☆594Dec 21, 2021Updated 4 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆446Sep 7, 2022Updated 3 years ago