sdcampbell / phpLFI
Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via includes to download additional source code files.
☆13Updated 2 years ago
Alternatives and similar repositories for phpLFI:
Users that are interested in phpLFI are comparing it to the libraries listed below
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Right-To-Left Override POC☆34Updated 3 years ago
- Modified version of PEAS client for offensive operations☆39Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- Some of my custom "tools".☆22Updated 3 years ago
- ☆47Updated 2 years ago
- ☆17Updated 4 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆13Updated 5 years ago
- A little implant which SSH's back with a shell☆36Updated 3 years ago
- Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960☆2Updated 2 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- ☆35Updated 4 years ago
- ☆16Updated last year
- Convert ldapdomaindump to Bloodhound☆79Updated last year
- A script used to query the dehashed API and filter for more useful results☆15Updated 3 years ago
- ☆23Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆13Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- ☆30Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- ☆26Updated 2 years ago
- ☆15Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆28Updated last year