p0dalirius / Joomla-1.6-1.7-2.5-Privilege-Escalation-VulnerabilityLinks
A Python script to create an administrator account on Joomla! 1.6/1.7/2.5 using a privilege escalation vulnerability
☆19Updated 10 months ago
Alternatives and similar repositories for Joomla-1.6-1.7-2.5-Privilege-Escalation-Vulnerability
Users that are interested in Joomla-1.6-1.7-2.5-Privilege-Escalation-Vulnerability are comparing it to the libraries listed below
Sorting:
- Multithreaded spraying of a password on all accounts of a domain.☆25Updated 10 months ago
- A Python script to find tenant id an region from a list of domain names.☆15Updated 10 months ago
- This repository presents a proof-of-concept of CVE-2023-22527☆11Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 10 months ago
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆24Updated last year
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Updated 10 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Updated 10 months ago
- A collection of http fuzzing python scripts to fuzz HTTP servers for bugs.☆15Updated 2 years ago
- CVE-2013-4786 Go exploitation tool☆39Updated 3 weeks ago
- A PoC for achieving persistence via push notifications on Windows☆48Updated 2 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Updated 2 years ago
- Decode the values of common Windows properties such as userAccountControl and sAMAccountType.☆23Updated 2 years ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆40Updated last month
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆21Updated last year
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 10 months ago
- Original PoC for CVE-2023-30367☆15Updated last year
- ☆22Updated 2 years ago
- Right-To-Left Override POC☆36Updated 3 years ago
- A port of classic netcat to C#☆34Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- CVE-2022-30780 - lighttpd remote denial of service☆17Updated last year
- ☆53Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 4 years ago
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆13Updated 10 months ago
- Tools for Attacking Pleasant Password Server☆22Updated 2 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆31Updated 2 weeks ago
- CVE-2023-1671-POC, based on dnslog platform☆17Updated 2 years ago