Script and resources to execute shell commands using access to a PostgreSQL service
☆13Oct 24, 2024Updated last year
Alternatives and similar repositories for pg_exec
Users that are interested in pg_exec are comparing it to the libraries listed below
Sorting:
- A simple geofencing (polygon-creation) tool built on Leaflet☆16Feb 5, 2015Updated 11 years ago
- ☆29May 30, 2024Updated last year
- [WIP] Creates an epub from a wikidot wiki. Made specifically for SCP☆14Jun 29, 2021Updated 4 years ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- A cheatsheet for exploiting server-side SVG rasterization.☆30Jul 5, 2022Updated 3 years ago
- Working Neat version 5.7(5.7.1_474) with cloud and account functionality disabled.☆21Jan 4, 2025Updated last year
- couchdb remote command exec.☆14Mar 27, 2018Updated 7 years ago
- This repository is a mirror of https://git.openwrt.org/openwrt/openwrt.git It is for reference only and is not active for check-ins or fo…☆19Apr 2, 2022Updated 3 years ago
- ☆14Feb 12, 2026Updated last month
- Assorted Cereals☆10Nov 13, 2021Updated 4 years ago
- Remote packet Sniffer that encapsulates captured packets into TZSP and copies them to a remote IP☆21Nov 19, 2025Updated 4 months ago
- An OpenWRT fork for all the IEEE 802.11ad MikroTik devices☆17Nov 18, 2021Updated 4 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 5 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- This is a compilation of various shells that I had found in the wild.☆15May 30, 2013Updated 12 years ago
- Shellcode runner to execute malicious payload and bypass AV☆14Nov 28, 2021Updated 4 years ago
- ☆10Feb 3, 2021Updated 5 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46May 31, 2023Updated 2 years ago
- Automated evasive phishing infrastructure☆18Feb 11, 2023Updated 3 years ago
- WebSocket API description and implementations for several programming languages☆13Feb 9, 2026Updated last month
- Unicode fuzzer for various purposes☆49Dec 18, 2021Updated 4 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Nov 6, 2016Updated 9 years ago
- Advent Calendar CTF 2014☆10Nov 4, 2015Updated 10 years ago
- Simulates engine sounds from first principles☆15Jan 23, 2019Updated 7 years ago
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- exploitation of php use-after-free vulnerabilities on 64 bit systems | poc||gtfo☆12Apr 8, 2015Updated 10 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 11 months ago
- Exploiting CVE-2017-7525 demo project with Angular7 frontend and Spring.☆18Feb 21, 2019Updated 7 years ago
- Solid State CD-ROM emulation with a Raspberry Pi Zero☆37May 22, 2020Updated 5 years ago
- Small tool to run reverse IP lookup for given IP, IP range or IP list☆13Jan 2, 2020Updated 6 years ago
- Server prepared for SSRF post exploitation, javascript exploits and open redirect.☆13Jan 4, 2023Updated 3 years ago
- CTF collaboration tool for teams☆10Nov 10, 2017Updated 8 years ago
- Dnslog Interactsh的Py版接口查询☆13Dec 10, 2021Updated 4 years ago
- Dll injection for executable file☆17Jul 22, 2016Updated 9 years ago