joren485 / Magento-Shoplift-SQLILinks
Proof of Concept code of the Shoplift code
☆39Updated 3 years ago
Alternatives and similar repositories for Magento-Shoplift-SQLI
Users that are interested in Magento-Shoplift-SQLI are comparing it to the libraries listed below
Sorting:
- pentest tools☆41Updated 7 years ago
- Linux Local Enumeration Script☆79Updated 5 years ago
- Enyx SNMP IPv6 Enumeration Tool☆103Updated 2 years ago
- davtest (improved)- Exploits WebDAV folders☆114Updated 2 years ago
- Just some exploits :P☆46Updated 4 years ago
- This is a small script to make the local exploitation process easier. It downloads the precompiled exploit for x86 and x64 architectures …☆31Updated 7 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- udp-proto-scanner is a Perl script which discovers UDP services by sending triggers to a list of hosts☆99Updated last year
- An implementation of NSA's ExplodingCan exploit in Python☆264Updated 7 years ago
- ☆121Updated 8 years ago
- XVWA on LAMP base docker image☆44Updated 6 years ago
- HP Power Manager 'formExportDataLogs' Buffer Overflow☆21Updated 7 years ago
- Handbook and survival guide for hacking over the wire, OSCP-style☆43Updated 4 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆46Updated 10 years ago
- Custom tools and projects about security☆110Updated last month
- Cheap & Nasty Wordpress Command Execution Shell☆88Updated 6 years ago
- Scripts to execute enumeration via LFI☆89Updated 6 years ago
- Changes for Visual Studio 2013☆118Updated 10 years ago
- ☆67Updated 11 years ago
- Updating MS08-067 Python exploit script☆104Updated 6 years ago
- This will give you shell access on the target system if redis server is not configured properly and faced on the internet without any aut…☆100Updated 5 years ago
- ☆94Updated 7 years ago
- Albatar is a SQLi exploitation framework in Python☆137Updated 6 months ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆288Updated 10 years ago
- Collection of different exploits☆182Updated 4 years ago
- A simple exploit to execute system command on codiad☆65Updated 6 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Updated 4 years ago
- ☆155Updated 7 years ago
- An SNMPv3 User Enumerator and Attack tool☆255Updated 4 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago