The best exploitation tool for SSL VPN 0day vulnerabilities.
☆82Nov 13, 2021Updated 4 years ago
Alternatives and similar repositories for PwnVPN
Users that are interested in PwnVPN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Mar 29, 2022Updated 4 years ago
- WebSocket shell☆14Nov 29, 2020Updated 5 years ago
- Dump all available paths and/or endpoints on WADL file.☆98Nov 24, 2025Updated 5 months ago
- Powerful, open source licensing system, written asynchronous in .NET Core☆13Dec 25, 2021Updated 4 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- exploit code for F5-Big-IP (CVE-2020-5902)☆43May 22, 2023Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- This script was used for the bots in April to gain access over Panorama☆15Jan 6, 2020Updated 6 years ago
- A proof-of-concept reverse-shell written in rust.☆32Apr 26, 2019Updated 7 years ago
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- Dumping credentials through windbg and pykd☆41Sep 25, 2023Updated 2 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- VilNE Scanner☆19Oct 19, 2023Updated 2 years ago
- Qt/Qml application using Google speech-to-text API to make voice commands☆11Jan 19, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆35Jan 22, 2025Updated last year
- ☠️ Python script and example file to test the Right-To-Left Override attack☆10Feb 25, 2019Updated 7 years ago
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60May 16, 2021Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Aug 14, 2019Updated 6 years ago
- A library that scrapes Linkedin for user data☆25May 12, 2021Updated 4 years ago
- DO NOT RUN THIS.☆47Oct 20, 2021Updated 4 years ago
- Orusula is an Website hacking tool.☆18Sep 30, 2020Updated 5 years ago
- JSshell - JavaScript reverse/remote shell☆630Dec 20, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- List of fresh DNS resolvers updated daily☆106Feb 9, 2023Updated 3 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 4 months ago
- Simultaneously execute various subdomain enumeration tools and aggregate results.☆42Jun 19, 2024Updated last year
- BootMe.club stresser Source Nulled by RootSec☆20Jan 8, 2020Updated 6 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.☆12Feb 21, 2025Updated last year
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- ☆24Dec 23, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 10 months ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 6 years ago
- An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and…☆808Jul 4, 2023Updated 2 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Apr 30, 2021Updated 4 years ago
- ☆16Jan 18, 2020Updated 6 years ago