noraj / Umbraco-RCELinks
Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution
☆75Updated 4 years ago
Alternatives and similar repositories for Umbraco-RCE
Users that are interested in Umbraco-RCE are comparing it to the libraries listed below
Sorting:
- Changes for Visual Studio 2013☆119Updated 10 years ago
- Windows Kernel Exploits☆68Updated 8 years ago
- Powershell crazy and sometimes diabolic scripts☆159Updated 5 years ago
- Juicy Potato for x86 Windows☆128Updated 6 years ago
- Scripts created to help with post exploitation of a Windows host☆99Updated 4 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆47Updated 10 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆138Updated 3 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆46Updated last year
- Reverse Shell-able Windows exploits short POCs.☆32Updated 5 years ago
- ☆83Updated 5 years ago
- OSCP Cheatsheets☆98Updated 6 years ago
- ☆104Updated 5 years ago
- ☆153Updated last month
- Simple script to generate commands to achieve reverse shells.☆120Updated 4 years ago
- CVE-2007-2447 - Samba usermap script☆60Updated 5 years ago
- ☆163Updated 3 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆31Updated 5 years ago
- Preparation for OSWE☆44Updated 5 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆64Updated 6 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆146Updated 4 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆76Updated 6 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆103Updated last year
- Collection of username lists for enumerating kerberos domain users☆103Updated 7 years ago
- mRemoteNG Config File Decrypt☆88Updated 2 years ago
- ☆177Updated 6 months ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆168Updated 3 years ago
- Squid Pivoting Open Port Scanner☆86Updated 10 months ago
- These are exploits created to avoid the use of Metasploit. While studying for OSCP in the Offsec labs, VHL, Vulnhub, etc, I tried to find…☆30Updated 2 months ago