sqlmapproject / udfhack
Database takeover UDF repository
☆180Updated 7 years ago
Alternatives and similar repositories for udfhack:
Users that are interested in udfhack are comparing it to the libraries listed below
- (Deprecated) HQLmap, Automatic tool to exploit HQL injections☆228Updated 5 years ago
- CVE-2018-2893-PoC☆103Updated 6 years ago
- Acunetix 0day RCE☆192Updated 8 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆173Updated 8 years ago
- some pentest scripts & tools by yaseng@uauc.net☆148Updated 5 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆303Updated 8 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆306Updated 7 years ago
- CVE-2018-8581☆371Updated 2 years ago
- YSOSERIAL Integration with burp suite☆164Updated 2 years ago
- ☆78Updated 10 years ago
- Content hijacking proof-of-concept using Flash, PDF and Silverlight☆381Updated 5 years ago
- Add headers to all Burp requests to bypass some WAF products☆331Updated 7 years ago
- A tool that checks and downloads scripts that will aid with privilege escalation on a Windows system.☆169Updated 8 years ago
- ntlm relay attack to Exchange Web Services☆331Updated 7 years ago
- Script to test if a server is vulnerable to the JetLeak vulnerability☆144Updated 8 years ago
- A JBoss script for obtaining remote shell access☆170Updated 4 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆290Updated last year
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆209Updated 6 years ago
- Central Repo for Burp extensions☆151Updated 3 years ago
- Bash script that tests if a system is Winshock (MS14-066) vulnerable☆100Updated 10 years ago
- WebLogic Exploit☆142Updated 6 years ago
- Automatically scan the inner network to detect whether they are vulnerable.☆140Updated 3 years ago
- Utils☆267Updated 9 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆171Updated 6 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆126Updated 2 years ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromgif()☆121Updated 9 years ago
- ☆232Updated 9 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆99Updated 7 years ago
- Java serialization brute force attack tool.☆122Updated 7 years ago
- Learn from Casey Smith @subTee☆241Updated 7 years ago