The best exploitation tool for SSL VPN 0day vulnerabilities.
☆82Nov 13, 2021Updated 4 years ago
Alternatives and similar repositories for PwnVPN
Users that are interested in PwnVPN are comparing it to the libraries listed below
Sorting:
- WebSocket shell☆14Nov 29, 2020Updated 5 years ago
- Dump all available paths and/or endpoints on WADL file.☆98Nov 24, 2025Updated 3 months ago
- Related subdomains finder☆28May 18, 2022Updated 3 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- exploit code for F5-Big-IP (CVE-2020-5902)☆43May 22, 2023Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- ☆34Jan 22, 2025Updated last year
- ☠️ Python script and example file to test the Right-To-Left Override attack☆10Feb 25, 2019Updated 7 years ago
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60May 16, 2021Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Aug 14, 2019Updated 6 years ago
- DO NOT RUN THIS.☆47Oct 20, 2021Updated 4 years ago
- JSshell - JavaScript reverse/remote shell☆632Dec 20, 2022Updated 3 years ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 3 months ago
- BootMe.club stresser Source Nulled by RootSec☆20Jan 8, 2020Updated 6 years ago
- Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.☆12Feb 21, 2025Updated last year
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- Loader and RunPE file executer☆18Jun 12, 2019Updated 6 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 9 months ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and…☆804Jul 4, 2023Updated 2 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- ☆16Jan 18, 2020Updated 6 years ago
- Sign JSON objects with ED25519 signatures☆12Sep 23, 2022Updated 3 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Jun 8, 2020Updated 5 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago
- CVE-2021-22986 & F5 BIG-IP RCE☆91Apr 3, 2021Updated 4 years ago
- PwnXSS: Vulnerability (XSS) scanner exploit☆808Dec 30, 2022Updated 3 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- Subdomain and target enumeration tool built for offensive security testing☆938Jun 19, 2024Updated last year