r00t-3xp10it / postgresql-fixLinks
Metasploit_postgresql_database_connection_fix
☆12Updated 6 years ago
Alternatives and similar repositories for postgresql-fix
Users that are interested in postgresql-fix are comparing it to the libraries listed below
Sorting:
- Simple Linux RootKit written in python☆10Updated 8 years ago
- ☆51Updated 11 years ago
- PowerShell Reverse HTTPs Shell☆29Updated 11 years ago
- Exploits Oracle 9i XDB ftp password buffer overflow vulnerability☆11Updated 10 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated last year
- A python Code to obfuscate any non-fud python payload and generate a ready to use FUD Python executable script☆24Updated 6 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆77Updated 7 years ago
- Random stuff☆16Updated 7 years ago
- A simple python reverse shell written just for fun.☆63Updated 2 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆81Updated 7 years ago
- ☆19Updated 8 years ago
- This is the list of all rootkits found so far on github and othersites.☆30Updated 5 years ago
- Converts a command to a base64 powershell compatible string☆27Updated 11 years ago
- Autosploit = Automating Metasploit Modules.☆77Updated 6 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24Updated 7 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33Updated 6 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago
- Transform your batch (bat) script into one binary.exe☆51Updated last year
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 8 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆23Updated 9 years ago
- using VBS to download and install a powershell malware☆39Updated 6 years ago
- One-off scripts☆52Updated 8 years ago
- PHP Phishing Framework☆28Updated 12 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Updated 9 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- pentest toolbox☆27Updated 3 years ago