kimusan / pkwnerLinks
A python3 and bash PoC for CVE-2021-4034 by Kim Schulz
☆21Updated 3 years ago
Alternatives and similar repositories for pkwner
Users that are interested in pkwner are comparing it to the libraries listed below
Sorting:
- Exploit to dump ipmi hashes☆35Updated 2 years ago
- A Python based ingestor for BloodHound☆85Updated 2 years ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆30Updated 5 years ago
- CLI monitor for windows process- & file activity☆89Updated 4 years ago
- ☆29Updated 4 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 4 years ago
- A utility for automating the testing and re-signing of Express.js cookie secrets.☆59Updated 2 years ago
- Collection of username lists for enumerating kerberos domain users☆97Updated 7 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆65Updated 4 months ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆91Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆47Updated 2 years ago
- Community documentation for known Hack The Box v4 API endpoints☆25Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 7 months ago
- ☆44Updated 2 years ago
- ☆92Updated 4 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆69Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆76Updated last year
- Automate converting webshells into reverse shells.☆69Updated 2 weeks ago
- ☆35Updated 3 years ago
- brute-forcing su for fun and possibly profit☆97Updated 6 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆59Updated 2 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆90Updated last year
- Windows Privilege Escalation☆68Updated 3 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12Updated 2 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- A post-exploitation tool to decrypt SolarPutty's sessions files☆36Updated 2 years ago
- Spoofcheck☆39Updated 3 months ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆41Updated 3 years ago