stackoverflowin / XML-RPC-reflectionLinks
A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.
☆29Updated 8 years ago
Alternatives and similar repositories for XML-RPC-reflection
Users that are interested in XML-RPC-reflection are comparing it to the libraries listed below
Sorting:
- ☆54Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- ~ BannerGrab☆25Updated 9 years ago
- A Upnp exploitation tool.☆106Updated 6 years ago
- Packet Knock-Out is an exploration in a method of data exfiltration via packet port numbers.☆14Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Cronbased Dirty Cow Exploit☆30Updated 8 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆73Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Stargate☆95Updated 9 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- Detect snooper on your system!☆85Updated 8 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables☆49Updated 9 years ago
- Some NSE scripts to search information from routers☆35Updated 10 years ago
- WeakNet PHP Execution Shell☆31Updated 10 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- This repository contains some bettercap transparent proxy example modules.☆16Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Scripts that aren't PowerShell☆48Updated 5 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Updated 10 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- ☆43Updated 11 years ago