r00t-3xp10it / postgresql-fixLinks
Metasploit_postgresql_database_connection_fix
☆12Updated 7 years ago
Alternatives and similar repositories for postgresql-fix
Users that are interested in postgresql-fix are comparing it to the libraries listed below
Sorting:
- Simple Linux RootKit written in python☆10Updated 8 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Updated 7 years ago
- Exploits Oracle 9i XDB ftp password buffer overflow vulnerability☆11Updated 10 years ago
- PowerShell Reverse HTTPs Shell☆29Updated 11 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33Updated 6 years ago
- A simple python reverse shell written just for fun.☆62Updated 3 years ago
- Converts a command to a base64 powershell compatible string☆27Updated 11 years ago
- A python Code to obfuscate any non-fud python payload and generate a ready to use FUD Python executable script☆24Updated 6 years ago
- ☆19Updated 8 years ago
- Random stuff☆16Updated 7 years ago
- ☆51Updated 12 years ago
- Enumerates users based off RDP Screenshots☆36Updated 2 years ago
- 🔅 Reverse shell written on python3☆14Updated 5 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆23Updated 9 years ago
- pentest toolbox☆27Updated 3 years ago
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆82Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated last year
- This is the list of all rootkits found so far on github and othersites.☆30Updated 5 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- Autosploit = Automating Metasploit Modules.☆77Updated 6 years ago
- Kill Any Antivirus Using Python For Windows Users .☆47Updated 9 years ago
- Web Browser Hooking Framework. Manage, execute and assess web browser vulnerabilities☆40Updated 7 years ago
- ssh session type for metasploit☆101Updated 3 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 9 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆31Updated 7 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- using VBS to download and install a powershell malware☆39Updated 6 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆58Updated 2 years ago
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆33Updated 4 years ago