mschwager / 0wnedLinks
Code execution via Python package installation.
☆171Updated 6 years ago
Alternatives and similar repositories for 0wned
Users that are interested in 0wned are comparing it to the libraries listed below
Sorting:
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- A simple Python script to exploit the OpenSSH User Enumeration Timing Attack.☆158Updated 4 years ago
- Small Python library that makes it easy to exploit race conditions in web apps with Requests.☆161Updated 2 years ago
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- An information gathering tool to collect git commit emails in version control host services☆154Updated 6 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆290Updated 5 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- unix wildcard attacks☆135Updated 7 years ago
- ProxyDock is a Dockerfile and Bash script that converts your OpenVPN files into local proxies.☆137Updated 5 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- ☆122Updated 7 years ago
- The Guppy Proxy (GUI Pappy)☆143Updated 6 years ago
- Python script to scan Git repos for interesting strings☆160Updated 5 years ago
- port of mimipenguin.sh in python with some additional protection features☆210Updated 8 years ago
- ⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project☆176Updated 5 years ago
- Discover target social media profiles☆81Updated 2 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago
- cve-2018-10933 libssh authentication bypass☆108Updated 6 years ago
- detectem - detect software and its version on websites.☆157Updated 4 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆154Updated 10 years ago
- A DNS connectback shell executed by strings in payloads.txt☆102Updated last year
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆97Updated 8 years ago
- Red Team Resources☆60Updated 6 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Updated 7 years ago
- Code Review Audit Script Scanner☆140Updated 4 months ago
- Some exploits and exploit development stuff.☆148Updated 3 years ago