sqlmapproject / udfhack
Database takeover UDF repository
☆180Updated 6 years ago
Alternatives and similar repositories for udfhack:
Users that are interested in udfhack are comparing it to the libraries listed below
- (Deprecated) HQLmap, Automatic tool to exploit HQL injections☆227Updated 5 years ago
- Acunetix 0day RCE☆192Updated 8 years ago
- some pentest scripts & tools by yaseng@uauc.net☆149Updated 4 years ago
- YSOSERIAL Integration with burp suite☆163Updated 2 years ago
- Automatically scan the inner network to detect whether they are vulnerable.☆140Updated 3 years ago
- Add headers to all Burp requests to bypass some WAF products☆330Updated 7 years ago
- CVE-2018-2893-PoC☆103Updated 6 years ago
- ASTROID v 1.2 bypass most A.V softwares☆89Updated 7 years ago
- CVE-2019-3396 confluence SSTI RCE☆174Updated 4 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆302Updated 8 years ago
- A tool that checks and downloads scripts that will aid with privilege escalation on a Windows system.☆169Updated 8 years ago
- Veil's PowerTools are a collection of PowerShell projects with a focus on offensive operations.☆98Updated 9 years ago
- WebLogic Exploit☆142Updated 6 years ago
- Web Backdoor Cookie Script-Kit☆182Updated 12 years ago
- Green-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.☆129Updated 6 years ago
- Proof-of-concept to exploit the flaw in the PHP-GD built-in function, imagecreatefromgif()☆120Updated 9 years ago
- Central Repo for Burp extensions☆150Updated 3 years ago
- CVE-2018-7600 - Drupal 7.x RCE☆71Updated 6 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆172Updated 8 years ago
- ☆78Updated 10 years ago
- A JBoss script for obtaining remote shell access☆170Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆100Updated 3 years ago
- WSDL Parser extension for Burp☆232Updated 6 years ago
- ntlm relay attack to Exchange Web Services☆330Updated 7 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆99Updated 7 years ago
- Bash script that tests if a system is Winshock (MS14-066) vulnerable☆100Updated 10 years ago
- CVE-2018-8581☆371Updated 2 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆306Updated 7 years ago
- Content hijacking proof-of-concept using Flash, PDF and Silverlight☆381Updated 5 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆170Updated 6 years ago