The best exploitation tool for SSL VPN 0day vulnerabilities.
☆82Nov 13, 2021Updated 4 years ago
Alternatives and similar repositories for PwnVPN
Users that are interested in PwnVPN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Mar 29, 2022Updated 4 years ago
- WebSocket shell☆14Nov 29, 2020Updated 5 years ago
- Powerful, open source licensing system, written asynchronous in .NET Core☆13Dec 25, 2021Updated 4 years ago
- Related subdomains finder☆28May 18, 2022Updated 3 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- exploit code for F5-Big-IP (CVE-2020-5902)☆43May 22, 2023Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- A proof-of-concept reverse-shell written in rust.☆32Apr 26, 2019Updated 6 years ago
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- Dumping credentials through windbg and pykd☆41Sep 25, 2023Updated 2 years ago
- ☆35Jan 22, 2025Updated last year
- ☠️ Python script and example file to test the Right-To-Left Override attack☆10Feb 25, 2019Updated 7 years ago
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60May 16, 2021Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Aug 14, 2019Updated 6 years ago
- A library that scrapes Linkedin for user data☆24May 12, 2021Updated 4 years ago
- ☆10Jun 11, 2022Updated 3 years ago
- JSshell - JavaScript reverse/remote shell☆633Dec 20, 2022Updated 3 years ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- Simultaneously execute various subdomain enumeration tools and aggregate results.☆42Jun 19, 2024Updated last year
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆24Dec 23, 2021Updated 4 years ago
- ActionScript ByteCode Disassembler☆16Oct 20, 2015Updated 10 years ago
- Loader and RunPE file executer☆19Jun 12, 2019Updated 6 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 9 months ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and…☆805Jul 4, 2023Updated 2 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆16Jan 18, 2020Updated 6 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Jun 8, 2020Updated 5 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- CVE-2021-22986 & F5 BIG-IP RCE☆91Apr 3, 2021Updated 5 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago