sqlmapproject / udfhack
Database takeover UDF repository
☆179Updated 7 years ago
Alternatives and similar repositories for udfhack
Users that are interested in udfhack are comparing it to the libraries listed below
Sorting:
- some pentest scripts & tools by yaseng@uauc.net☆148Updated 5 years ago
- (Deprecated) HQLmap, Automatic tool to exploit HQL injections☆229Updated 5 years ago
- Acunetix 0day RCE☆192Updated 9 years ago
- Bash script that tests if a system is Winshock (MS14-066) vulnerable☆100Updated 10 years ago
- CVE-2018-2893-PoC☆103Updated 6 years ago
- ASTROID v 1.2 bypass most A.V softwares☆88Updated 7 years ago
- Automatically scan the inner network to detect whether they are vulnerable.☆142Updated 4 years ago
- A tool that checks and downloads scripts that will aid with privilege escalation on a Windows system.☆169Updated 9 years ago
- Content hijacking proof-of-concept using Flash, PDF and Silverlight☆382Updated 6 years ago
- Web Backdoor Cookie Script-Kit☆184Updated 13 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆173Updated 8 years ago
- Create a TCP circuit through validly formed HTTP requests☆345Updated 8 years ago
- Add headers to all Burp requests to bypass some WAF products☆331Updated 7 years ago
- Impacket is a collection of Python classes for working with network protocols.☆100Updated 3 years ago
- Central Repo for Burp extensions☆151Updated 3 years ago
- ☆79Updated 10 years ago
- YSOSERIAL Integration with burp suite☆165Updated 2 years ago
- JNDI Attacking Tool☆238Updated 2 years ago
- Veil's PowerTools are a collection of PowerShell projects with a focus on offensive operations.☆98Updated 10 years ago
- CVE-2018-7600 - Drupal 7.x RCE☆72Updated 7 years ago
- Bash simulator to control a server using PHP system functions.☆101Updated 4 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆209Updated 6 years ago
- CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability☆332Updated 6 years ago
- Script used to generate and encode a PowerShell based Metasploit payloads.☆275Updated 3 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆171Updated 6 years ago
- Learn from Casey Smith @subTee☆242Updated 7 years ago
- Java serialization brute force attack tool.☆123Updated 7 years ago
- Web Fuzzing Discovery and Attack Pattern Database☆114Updated 7 years ago
- Green-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.☆130Updated 6 years ago
- SHELLING - a comprehensive OS command injection payload generator☆445Updated 5 years ago