javabudd / vulnpress
A Wordpress Exploitation Toolkit
☆15Updated 7 years ago
Alternatives and similar repositories for vulnpress:
Users that are interested in vulnpress are comparing it to the libraries listed below
- Dumps TeamViewer ID,Password and account settings from a running TeamViewer instance by enumerating child windows.☆45Updated 2 years ago
- CVE & others☆18Updated 6 years ago
- a exploit for cve-2016-0728☆7Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- Spam Honeypot Tool☆26Updated 8 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆31Updated 11 years ago
- Scripts that aren't PowerShell☆47Updated 5 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 10 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆37Updated 4 years ago
- ☆17Updated 10 years ago
- A web app scanner☆26Updated 11 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆15Updated 8 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 6 years ago
- ☆31Updated 8 years ago
- A BurpSuite extension for lair☆28Updated 7 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- ☆34Updated 8 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Burp extension that checks for interesting and security headers☆43Updated 4 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago