squid22 / PostgreSQL_RCE
Get a reverse shell using PostgreSQL
☆17Updated 6 months ago
Alternatives and similar repositories for PostgreSQL_RCE:
Users that are interested in PostgreSQL_RCE are comparing it to the libraries listed below
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆16Updated last year
- ☆38Updated 2 years ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- Precompiled executable☆44Updated 2 weeks ago
- CLI monitor for windows process- & file activity☆83Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆68Updated 6 months ago
- generate payloads that force authentication against an attacker machine☆104Updated 2 years ago
- Study guide and command sheet for Offensive Security PEN-210 course (Offensive Security Wireless Pentester - OSWP)☆61Updated last year
- ☆31Updated 3 years ago
- A cheatsheet for NetExec☆112Updated last month
- Journey so Far☆22Updated 3 years ago
- This script will bruteforce the credential of tomcat manager or host-manager☆21Updated 4 years ago
- Aspx reverse shell☆104Updated 5 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 4 months ago
- ☆33Updated 2 years ago
- ☆27Updated 4 years ago
- ☆19Updated 10 months ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆56Updated 2 years ago
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- CVE-2023-2255 Libre Office☆58Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆82Updated last year
- Exploit to dump ipmi hashes☆31Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆17Updated last year
- ☆82Updated last month
- ☆102Updated last year
- Bad scripts I made doing CTF's☆21Updated last year
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆90Updated 9 months ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 3 years ago
- Joomla login bruteforce☆62Updated 7 months ago
- AV EVASION TECHNIQUES☆77Updated 2 years ago