Cheap & Nasty Wordpress Command Execution Shell
☆92May 10, 2019Updated 6 years ago
Alternatives and similar repositories for wordpress-shell
Users that are interested in wordpress-shell are comparing it to the libraries listed below
Sorting:
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Framework for Man-In-The-Middle attacks☆15Feb 19, 2018Updated 8 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Aug 20, 2020Updated 5 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- LD_PRELOAD Linux rootkit (x86 & ARM)☆26Apr 8, 2019Updated 6 years ago
- Responder for Python3☆99Aug 15, 2019Updated 6 years ago
- ImperiumRAT is an advanced remote administration tool with features like (Remote desktop, Disable CMD, Turn on/off webcam, and more!)☆12Dec 7, 2022Updated 3 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- Web-based shell written in PHP☆12Aug 27, 2018Updated 7 years ago
- ☆14Jan 5, 2024Updated 2 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 12, 2019Updated 6 years ago
- Collection of IronPython scripts and executables for penetration testing☆57Feb 26, 2019Updated 7 years ago
- WebCruiserWVS 轻量级基于C#的扫描器,椰树扫描器的前身☆11Apr 18, 2018Updated 7 years ago
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 4 years ago
- A windbg extension for ASLR/DEP/SafeSEH check☆28May 19, 2018Updated 7 years ago
- PHP root (suid) reverse shell☆74Jun 22, 2017Updated 8 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- Mac osx forensics tools☆12Nov 28, 2020Updated 5 years ago
- XLOCK Is a light, and powerful file locker that with features such as an interactive file interface, work in-progress shell with commands…☆13Jan 10, 2019Updated 7 years ago
- This is just a security testing tool. Don't use for illigal purpose otherwise we are not responsible for your action.☆14Aug 24, 2020Updated 5 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- ☆10Aug 21, 2024Updated last year
- SMBExec C# module☆219Aug 21, 2020Updated 5 years ago
- post/windows/manage/enable_rdp Metaploit module in Command prompt module☆36Apr 21, 2019Updated 6 years ago
- Linux Rootkits (4.x Kernel)☆87Jun 24, 2021Updated 4 years ago
- ☆16Dec 31, 2016Updated 9 years ago
- Collection of videos of Raids on Cybercriminals☆21Mar 19, 2025Updated 11 months ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Jul 8, 2019Updated 6 years ago