rastating / pga4decrypt
A tool for recovering server credentials from a pgadmin4 database
☆20Updated 3 years ago
Alternatives and similar repositories for pga4decrypt:
Users that are interested in pga4decrypt are comparing it to the libraries listed below
- A collection of published exploits and proof-of-concept code.☆21Updated 7 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Samba, NFS shares spider and grepper☆71Updated 6 years ago
- ☆23Updated 7 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Updated 2 years ago
- PHP tool to test XSS☆22Updated 5 years ago
- ☆29Updated 6 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆31Updated 10 years ago
- AV Bypass☆29Updated 7 years ago
- a parser + crawler for .DS_Store files exposed publically☆54Updated last year
- eternalrelayx☆38Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 4 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆28Updated 3 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆24Updated 5 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated last year
- The Outlook HTML Leak Test Project☆41Updated 6 years ago
- Full TTY reverse shell over SSH☆58Updated 4 years ago
- ☆20Updated 5 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Updated 4 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆46Updated 2 years ago
- EXIF-based command and control PoC☆16Updated 5 years ago