mubix / shellshocker-pocs
Collection of Proof of Concepts and Potential Targets for #ShellShocker
☆888Updated 4 years ago
Alternatives and similar repositories for shellshocker-pocs:
Users that are interested in shellshocker-pocs are comparing it to the libraries listed below
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆568Updated 10 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆332Updated last year
- kadimus is a tool to check and exploit lfi vulnerability.☆526Updated 4 years ago
- Post Exploitation Wiki☆515Updated 5 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆425Updated 5 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆488Updated 3 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆559Updated 9 months ago
- application server attack toolkit☆686Updated 4 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆572Updated 8 months ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆258Updated 3 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆274Updated 9 years ago
- ☆255Updated 7 years ago
- PwnWiki - The notes section of the pentesters mind.☆560Updated 6 years ago
- Debian OpenSSL Predictable PRNG (CVE-2008-0166)☆391Updated 2 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆969Updated 7 years ago
- ☆390Updated 4 years ago
- Python PTY backdoors - full PTY or nothing!☆742Updated 10 years ago
- Panoptic is an open source penetration testing tool that automates the process of search and retrieval of content for common log and conf…☆311Updated 3 years ago
- Collection of different exploits☆182Updated 4 years ago
- Linux post exploitation enumeration and exploit checking tools☆179Updated 4 years ago
- A collection of curated Java Deserialization Exploits☆594Updated 3 years ago
- Smart Install Exploitation Tool☆575Updated 3 years ago
- Windows Pentest Scripts☆230Updated 7 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆743Updated 6 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆631Updated 6 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆837Updated last week
- socks4 reverse proxy for penetration testing☆580Updated 6 years ago
- Post Exploitation Collection☆1,556Updated 4 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆452Updated 8 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 8 years ago