p0dalirius / Joomla-1.6-1.7-2.5-Privilege-Escalation-VulnerabilityLinks
A Python script to create an administrator account on Joomla! 1.6/1.7/2.5 using a privilege escalation vulnerability
☆16Updated 6 months ago
Alternatives and similar repositories for Joomla-1.6-1.7-2.5-Privilege-Escalation-Vulnerability
Users that are interested in Joomla-1.6-1.7-2.5-Privilege-Escalation-Vulnerability are comparing it to the libraries listed below
Sorting:
- Multithreaded spraying of a password on all accounts of a domain.☆22Updated 6 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Updated 6 months ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆12Updated 6 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- A Python script to find tenant id an region from a list of domain names.☆15Updated 6 months ago
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆22Updated last year
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Updated 6 months ago
- A collection of http fuzzing python scripts to fuzz HTTP servers for bugs.☆16Updated last year
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆20Updated 8 months ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated last year
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆22Updated 6 months ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆36Updated 2 months ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆23Updated 6 months ago
- CVE-2022-30780 - lighttpd remote denial of service☆18Updated last year
- Extract the windows major and minor build numbers from an ISO file, and automatically sort the iso files.☆16Updated 10 months ago
- ☆22Updated 2 years ago
- A port of classic netcat to C#☆33Updated 2 years ago
- ☆13Updated 7 months ago
- A repository with my code snippets for research/education purposes.☆51Updated 2 years ago
- ☆52Updated last year
- Right-To-Left Override POC☆35Updated 3 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆10Updated 6 months ago
- Cobalt Strike BOFS☆16Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windows☆47Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 3 years ago