Fake MySQL Server that attempts to steal files from clients.
☆23Aug 5, 2020Updated 5 years ago
Alternatives and similar repositories for Rogue-MySQL-Server
Users that are interested in Rogue-MySQL-Server are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- not an exploit or a poc☆16Apr 15, 2022Updated 3 years ago
- 可爬取、更新并将 K8S 官方漏洞翻译(通过 DeepSeek)成简体中文☆17Jul 19, 2025Updated 8 months ago
- ☆11Mar 30, 2017Updated 8 years ago
- POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon☆106Mar 14, 2023Updated 3 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument …☆27Feb 15, 2024Updated 2 years ago
- A PoC of a privilege escalation vulnerability in the Realtek rtkio64 Windows driver.☆20Jul 6, 2020Updated 5 years ago
- 读过的安全文章离线归档 | begin in 2023.11.23☆18Jun 4, 2024Updated last year
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆37Mar 4, 2025Updated last year
- birthday wish to hack font camera☆14Oct 18, 2025Updated 5 months ago
- Exploit for CVE-2022-30206☆76Sep 25, 2022Updated 3 years ago
- This is a Java program that exploits Spring Break vulnerability (CVE-2017-8046).☆17Jun 4, 2021Updated 4 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Exploit tool for CVE-2021-43008 Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability☆85Mar 16, 2024Updated 2 years ago
- A collection of tools for firebase realtime db vulnerability discovery☆12May 22, 2023Updated 2 years ago
- ☆11Mar 16, 2023Updated 3 years ago
- ☆12Oct 29, 2021Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆11Jul 5, 2023Updated 2 years ago
- A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.☆116Jan 31, 2025Updated last year
- Various examples of using eBPF code☆18Jan 3, 2024Updated 2 years ago
- This project will scrape all of repos on github according to the keywords.☆13Apr 3, 2019Updated 6 years ago
- 👤 Registration and profile management for symfony☆12Mar 12, 2026Updated last week
- ☆12Oct 9, 2020Updated 5 years ago
- Some resources to help you migrate PrestaShop to Symfony 3☆11Jan 20, 2020Updated 6 years ago
- ☆20Sep 27, 2017Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 8 years ago
- 蜜汁狗蛋yyds☆28Feb 18, 2025Updated last year
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Feb 27, 2024Updated 2 years ago
- AsyncRAT的汉化版☆11Dec 11, 2025Updated 3 months ago
- 自动化Google Hacking URL搜集工具☆10Apr 20, 2024Updated last year
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- Modules Prestashop Vuln Arbitrary File Upload☆10Dec 29, 2019Updated 6 years ago
- Fork of ligolo-ng with exec and service capability☆17Oct 30, 2023Updated 2 years ago
- 禅道研发项⽬管理系统sql注入漏洞☆13Jan 16, 2023Updated 3 years ago
- ☆14Mar 20, 2025Updated last year
- ☆15May 13, 2019Updated 6 years ago