SQL SERVER Exploitation.
☆27Mar 18, 2017Updated 9 years ago
Alternatives and similar repositories for SQL-nightmare
Users that are interested in SQL-nightmare are comparing it to the libraries listed below
Sorting:
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Nov 18, 2019Updated 6 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 9 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago
- nmap - unofficial git fork☆19Aug 2, 2017Updated 8 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- IBM Cloud Functions building block - Message Hub Trigger - This project provides a starting point for handling events from Message Hub wi…☆11Apr 23, 2019Updated 6 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- ☆14Mar 31, 2018Updated 7 years ago
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- C2 redirector as a web API☆10May 22, 2021Updated 4 years ago
- Golang Command & Control Server For Managing And Remote Accessing Machines Via Web Interface☆13Apr 13, 2023Updated 2 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- Mr.Robot - DIY Self Balancing Robot Project☆10Oct 25, 2017Updated 8 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- The state of the art, modular, portable and easily extensible MITM framework in a Docker Container.☆14Dec 30, 2017Updated 8 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Aug 9, 2019Updated 6 years ago
- A minimalistic way to run WAVSEP☆16May 14, 2018Updated 7 years ago
- Discord bot for Friends of Desoto☆13Updated this week
- Kubernetes for Beginners, by Packt PPublishing☆14Jan 30, 2023Updated 3 years ago
- This includes CVE-2022-22963, a Spring SpEL / Expression Resource Access Vulnerability, as well as CVE-2022-22965, the spring-webmvc/spri…☆14Mar 31, 2022Updated 3 years ago
- simple reverse tcp backdoor hack☆63Oct 2, 2020Updated 5 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- Setup and keep alive ssh tunnels to remote sites using autossh, screen☆19Mar 30, 2023Updated 2 years ago
- .NET decompiler/disassembler with editors that allows to change and compile the code back into the assembly☆20Feb 1, 2022Updated 4 years ago
- A vnc client dll for c#, written in c/c++ and c#, depends on TightVnc 2.7.10, so it can use Tight to push screen faster than vncsharp use…☆18Nov 18, 2019Updated 6 years ago