squid22 / PostgreSQL_RCE
Get a reverse shell using PostgreSQL
☆17Updated 7 months ago
Alternatives and similar repositories for PostgreSQL_RCE:
Users that are interested in PostgreSQL_RCE are comparing it to the libraries listed below
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- CLI monitor for windows process- & file activity☆83Updated 4 years ago
- ☆31Updated 3 years ago
- ☆38Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆69Updated 7 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 4 months ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆21Updated 2 months ago
- Study guide and command sheet for Offensive Security PEN-210 course (Offensive Security Wireless Pentester - OSWP)☆62Updated last year
- SeRestorePrivilege to SYSTEM☆95Updated 3 years ago
- ☆28Updated 4 years ago
- Aspx reverse shell☆105Updated 5 years ago
- Exploit to dump ipmi hashes☆32Updated last year
- generate payloads that force authentication against an attacker machine☆105Updated 2 years ago
- ☆75Updated 5 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆17Updated last year
- A cheatsheet for NetExec☆113Updated last month
- Precompiled executable☆46Updated last month
- ☆102Updated last year
- SeManageVolumePrivilege to SYSTEM☆92Updated last year
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- rcat☆67Updated 3 years ago
- ☆33Updated 2 years ago
- Python setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆97Updated 4 months ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆16Updated last year
- POC for CVE-2020-13151☆31Updated 4 years ago
- C# implementation of harmj0y's PowerView☆25Updated 5 years ago
- AV EVASION TECHNIQUES☆77Updated 2 years ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆56Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆40Updated 2 years ago
- This is the repository which is synced to the gitbook wiki at https://www.netexec.wiki/☆41Updated last week