Simple PHP webshell with a JPEG header to bypass weak image verification checks
☆68Apr 16, 2015Updated 10 years ago
Alternatives and similar repositories for php-jpeg-shell
Users that are interested in php-jpeg-shell are comparing it to the libraries listed below
Sorting:
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- Tools and library to manipulate EFI variables.☆10Updated this week
- Public release for b01lers CTF 2021. Thanks for playing!☆10Apr 10, 2021Updated 4 years ago
- ☆12Nov 19, 2017Updated 8 years ago
- Spot all domain controllers in a Microsoft Active Directory environment. Find computer name, FQDN, and IP address(es) of all DCs.☆19Jun 23, 2024Updated last year
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Jan 28, 2017Updated 9 years ago
- DursVuln - Nmap Scripting Engine (NSE)☆21Jul 16, 2025Updated 7 months ago
- CVE-2019-18890 POC (Proof of Concept)☆10Jan 6, 2020Updated 6 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- Technical Notes☆16Dec 1, 2017Updated 8 years ago
- Source code for the article "A bug story: data alignment on x86"☆17Nov 6, 2016Updated 9 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- ☆16Jun 16, 2021Updated 4 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29May 7, 2017Updated 8 years ago
- Mobile Pentest related stuff☆14Jun 14, 2017Updated 8 years ago
- ☆16Jun 23, 2024Updated last year
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 5 months ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆21Jul 4, 2017Updated 8 years ago
- DynamicSyscalls is a library written in .net resolves the syscalls dynamically (Has nothing to do with hooking/unhooking)☆66Nov 13, 2022Updated 3 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆126Feb 20, 2023Updated 3 years ago
- Using IPv6 to Bypass Security☆92Sep 4, 2025Updated 6 months ago
- Google dorks generator to find open shells (on government sites)☆28Jul 9, 2014Updated 11 years ago
- Anatomy of a linux kernel development☆27Mar 30, 2017Updated 8 years ago
- Thread Injection Kit. A notorious little attempt to create Windows CreateRemoteThread() equivalent on unix (*nix) platform.☆49Jul 10, 2011Updated 14 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Feb 18, 2017Updated 9 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆35Jan 13, 2023Updated 3 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆30Nov 9, 2022Updated 3 years ago
- ☆31Sep 23, 2022Updated 3 years ago
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆28Dec 18, 2022Updated 3 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago