sajith / mod-rootmeLinks
Ye olde root shell for ye olde httpd
☆44Updated 10 years ago
Alternatives and similar repositories for mod-rootme
Users that are interested in mod-rootme are comparing it to the libraries listed below
Sorting:
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103Updated 7 years ago
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- a simple portforwarder in ps1 with embeded c# code☆90Updated 7 years ago
- HP printer security research code☆91Updated 8 years ago
- ☆95Updated 7 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 9 months ago
- A WebDAV PROPFIND C2 tool☆119Updated 6 years ago
- Windows Stagers to circumvent restrictive network environments☆67Updated last year
- Aggregation of Cobalt Strike's aggressor scripts.☆142Updated 7 years ago
- with metasploit☆63Updated 5 years ago
- Cisco IOS SNMP RCE PoC☆253Updated 7 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆57Updated 5 years ago
- Python api for usage with cobalt strike's External C2 specification☆242Updated 2 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆75Updated 3 months ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Updated 8 years ago
- Unified repository for different Metasploit Framework payloads☆48Updated 5 years ago
- Used for the osce exam preparation☆74Updated 9 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 6 years ago
- Ex-pv8's☆64Updated 6 years ago
- Some exploits, which I’ve created during my OSCE preparation.☆83Updated 7 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆84Updated 8 years ago
- Gogs CVEs☆79Updated 6 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- ☆94Updated 7 years ago
- public exploits☆35Updated 2 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆109Updated 7 years ago
- Python tool to inject fake updates into unencrypted WSUS traffic☆113Updated 10 years ago
- How To Execute Shellcode via HTA☆141Updated 7 years ago
- Post module for Metasploit to execute ELF in memory☆85Updated 7 years ago