SQL SERVER Exploitation.
☆27Mar 18, 2017Updated 9 years ago
Alternatives and similar repositories for SQL-nightmare
Users that are interested in SQL-nightmare are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Nov 18, 2019Updated 6 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 9 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- nmap - unofficial git fork☆19Aug 2, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- CTF writeups☆13Jul 2, 2017Updated 8 years ago
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- PoC ActiveX SVG Document Execution☆19Nov 8, 2018Updated 7 years ago
- C2 redirector as a web API☆10May 22, 2021Updated 4 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- a pentesting/hacking script☆14Nov 27, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Mr.Robot - DIY Self Balancing Robot Project☆10Oct 25, 2017Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆94Sep 19, 2017Updated 8 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 8 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- Discord bot for Friends of Desoto☆13Apr 29, 2026Updated 3 weeks ago
- Open-source deobfuscator for dotnetpatcher (https://bitbucket.org/3dotdev/dotnet-patcher/src/)☆23Dec 28, 2015Updated 10 years ago
- This includes CVE-2022-22963, a Spring SpEL / Expression Resource Access Vulnerability, as well as CVE-2022-22965, the spring-webmvc/spri…☆14Mar 31, 2022Updated 4 years ago
- ida插件☆31Feb 29, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- simple reverse tcp backdoor hack☆63Oct 2, 2020Updated 5 years ago
- A Minecraft account authentication checker☆10Mar 9, 2022Updated 4 years ago
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 9 years ago
- Setup and keep alive ssh tunnels to remote sites using autossh, screen☆19Mar 30, 2023Updated 3 years ago
- A vnc client dll for c#, written in c/c++ and c#, depends on TightVnc 2.7.10, so it can use Tight to push screen faster than vncsharp use…☆18Nov 18, 2019Updated 6 years ago
- ☆10Mar 15, 2017Updated 9 years ago
- Abusing Self-XSS and Clickjacking to trigger XSS☆136Mar 18, 2017Updated 9 years ago
- Detect alive host and open port .☆17Dec 7, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A google dork parser that bypasses captcha's automatically.☆17Jul 15, 2025Updated 10 months ago
- Bluecoat proxies URL filtering bypass PoC☆14May 19, 2015Updated 11 years ago
- DEPRECATED: Python client for the Google TV Pairing and Anymote protocols.☆22May 5, 2020Updated 6 years ago
- It contains malicious features that can steal files from BitRAT tools.☆12Dec 19, 2021Updated 4 years ago
- Miscelaneous Dockers☆47Aug 26, 2021Updated 4 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- Socks5 server over Websockets☆40Oct 17, 2018Updated 7 years ago