☆57Sep 2, 2018Updated 7 years ago
Alternatives and similar repositories for pentest
Users that are interested in pentest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Dec 8, 2022Updated 3 years ago
- apache solr 5.x - 8.2.0 rce (with config api)☆11Oct 31, 2019Updated 6 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13May 18, 2018Updated 7 years ago
- Set Up WebDAV Server for Remote File Sharing and more☆35Aug 22, 2019Updated 6 years ago
- CVE-2018-2628☆20Apr 18, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- glibc getcwd() local privilege escalation compiled binaries☆32Feb 9, 2018Updated 8 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- ACTIVELabs Security Advisories☆24May 19, 2021Updated 4 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- ☆12Oct 18, 2019Updated 6 years ago
- A script to attack users who are RDPing into a machine and recurse this attack. For security testers and attack simulations.☆19Jun 29, 2017Updated 8 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- Just pick out the code we need.☆66Nov 22, 2019Updated 6 years ago
- A PoC for CVE-2018-7249☆15Apr 29, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Using GNU lightning to generate xor deobfuscation at runtime☆27Aug 22, 2017Updated 8 years ago
- PoC exploit for CVE-2018-5234☆31May 2, 2018Updated 8 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22May 24, 2019Updated 6 years ago
- fastjson_rce工具,不用搭建HTTP服务,不受JDK版本限制☆10Nov 25, 2019Updated 6 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- Host Header Injection Scanner☆50Oct 27, 2020Updated 5 years ago
- ☆41Jul 23, 2018Updated 7 years ago
- 基于docker虚拟化的恶意代码沙箱☆71Aug 13, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 一些漏洞分析☆48Jan 8, 2019Updated 7 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Scripts to automate standing up hosts in Linode☆15Feb 16, 2021Updated 5 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- A tiny Tor client implementation (written in C).☆20Aug 15, 2018Updated 7 years ago
- Windows Enumeration and Privilege Escalation Script☆18Nov 1, 2019Updated 6 years ago
- Axis2 RPC Shell☆14Sep 10, 2015Updated 10 years ago
- OutCHM就是可以生成一个CHM啦。☆14Nov 9, 2016Updated 9 years ago
- 一些漏洞的环境/利用工具/分析☆10Jul 24, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- New Found 0-days!☆36Dec 4, 2019Updated 6 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- Code injection via delay load libraries☆36Sep 20, 2017Updated 8 years ago
- beacon,aggressor-scripts,cna,cobalt-strike,email☆36Jun 18, 2019Updated 6 years ago
- collect☆17Aug 29, 2019Updated 6 years ago
- ☆32Sep 14, 2017Updated 8 years ago