An useful TCP/SSL tunnel utility.
☆43Aug 12, 2017Updated 8 years ago
Alternatives and similar repositories for xtunnel
Users that are interested in xtunnel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2017-0213 for command line☆58Jul 1, 2017Updated 8 years ago
- UDP to TCP tunnel for sending datagrams through weak network☆12Jan 31, 2013Updated 13 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- ☆15Dec 18, 2019Updated 6 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆15May 8, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 6 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- DNS log http://zone.wooyun.org/content/27119☆21May 10, 2016Updated 9 years ago
- Heartbleed OpenSSL exploit☆14Apr 11, 2014Updated 12 years ago
- PHP Webshell with handy features☆79Apr 20, 2016Updated 9 years ago
- Execute codes From XSLT☆16Dec 28, 2016Updated 9 years ago
- wifihack☆41May 5, 2009Updated 16 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- A vote and lottery App for Wechat☆13Dec 16, 2013Updated 12 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆56Jan 30, 2023Updated 3 years ago
- ICMP隧道,用于内网渗透工具☆10Mar 13, 2019Updated 7 years ago
- CVE-2019-18890 POC (Proof of Concept)☆10Jan 6, 2020Updated 6 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆17Jul 25, 2014Updated 11 years ago
- ☆14May 13, 2018Updated 7 years ago
- python版挖掘鸡☆12Nov 19, 2015Updated 10 years ago
- 安全狗sql注入绕过☆29Mar 21, 2018Updated 8 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 8 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- 做过的实验,踩过的坑☆40Jun 7, 2018Updated 7 years ago
- Meterpreter Encrypted Payload by C#☆165Jun 7, 2023Updated 2 years ago
- Vulners signature-base software version detection rules☆38Nov 9, 2021Updated 4 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Use to generate DLL through Visual Studio☆19Jul 24, 2017Updated 8 years ago
- My Pubkey☆13Oct 9, 2018Updated 7 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Starter Faucet is an open-source faucet coin giveaway. It aims to allow people to set up faucets with ease and allow them to be maintaine…☆14Nov 2, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆16Feb 26, 2018Updated 8 years ago
- 一些漏洞场景的还原,基于https://www.exploit-db.com/☆37Feb 7, 2018Updated 8 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Sep 13, 2017Updated 8 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- ☆15Jul 5, 2019Updated 6 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 9 years ago