Exploiting the xmlrpc.php
☆69Oct 21, 2023Updated 2 years ago
Alternatives and similar repositories for xmlrpc-attack
Users that are interested in xmlrpc-attack are comparing it to the libraries listed below
Sorting:
- ☆28Jul 21, 2025Updated 7 months ago
- Just a vault template to help someone on the certificate.☆12Sep 3, 2025Updated 6 months ago
- Journey to learning frida android.☆11Apr 23, 2019Updated 6 years ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- Perform With Massive Wordpress Enumeration☆12Aug 18, 2023Updated 2 years ago
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆34Sep 19, 2023Updated 2 years ago
- ☆27Feb 9, 2026Updated 3 weeks ago
- List of payloads: reverse shell, bind shell, webshell.☆17Feb 26, 2022Updated 4 years ago
- Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty…☆25Jan 13, 2024Updated 2 years ago
- hostinject (Host Header Injection) Tool is a Python script that allows you to perform host header injection vulnerability testing on a ta…☆29Jun 29, 2023Updated 2 years ago
- An unsecure by-design PWA that students can analyse with a suite of tools and support to build their understanding of web-based secure so…☆10Oct 16, 2025Updated 4 months ago
- ☆34Sep 28, 2023Updated 2 years ago
- A list of ChatGPT Prompts for Web Application Security, Bug Bounty, and Pentesting☆37May 18, 2023Updated 2 years ago
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆32Nov 4, 2022Updated 3 years ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆82Apr 12, 2025Updated 10 months ago
- POC for CVE-2024-34102. A pre-authentication XML entity injection issue in Magento / Adobe Commerce.☆31Jun 29, 2024Updated last year
- ☆34Apr 16, 2022Updated 3 years ago
- k8s ConfigMaps and Secrets Usage.☆11Jan 24, 2025Updated last year
- The following include a list of pentest tools available across the web. Many are free and even open source, others are premium tools and …☆50Aug 1, 2025Updated 7 months ago
- 紫菜鱼的网络安全扫描器☆11Dec 19, 2023Updated 2 years ago
- Telegram video (mp4) extension manipulation PoC☆96Mar 4, 2025Updated last year
- Ultimate Burp Suite Exam and PortSwigger Labs Guide.☆379Aug 20, 2025Updated 6 months ago
- CVE Collection of jQuery XSS Payloads☆75Jan 4, 2023Updated 3 years ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆44Oct 29, 2023Updated 2 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Final year project in Magshimim, focusing on Python development and Web Exploitation.☆10Apr 29, 2023Updated 2 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- This package helps to find missing translation strings in your Laravel blade files.☆10Jul 23, 2025Updated 7 months ago
- You'll find all the resources and presentations I have used in my talks and workshops☆12Nov 16, 2024Updated last year
- ☆10Jul 24, 2023Updated 2 years ago
- ghjk is a programmable runtime manager and an attempt at a successor for asdf.☆11Feb 20, 2026Updated 2 weeks ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- ☆32Feb 14, 2026Updated 2 weeks ago
- Jenkins WebInspect Plugin Publisher provides the ability to upload a WebInspect scan file, from your Jenkins server to your Fortify Softw…☆11Dec 23, 2025Updated 2 months ago
- CTF writeups☆16Nov 20, 2025Updated 3 months ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- Python script to create CSV, HTML & PDF filtered for repo tags☆13Jul 26, 2024Updated last year
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month