stackoverflowin / XML-RPC-reflection
A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.
☆29Updated 7 years ago
Alternatives and similar repositories for XML-RPC-reflection:
Users that are interested in XML-RPC-reflection are comparing it to the libraries listed below
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Updated 8 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Because I can't find scripts to do this anywhere else...☆25Updated 8 years ago
- Removed according to regulations☆35Updated 7 years ago
- ☆53Updated 8 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- ☆42Updated 10 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 8 years ago
- AutoBrowser Screenshot☆49Updated 8 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 7 years ago
- CTF website frontend for SecGen☆21Updated 7 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables☆49Updated 8 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago