stackoverflowin / XML-RPC-reflectionLinks
A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.
☆29Updated 8 years ago
Alternatives and similar repositories for XML-RPC-reflection
Users that are interested in XML-RPC-reflection are comparing it to the libraries listed below
Sorting:
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- ☆54Updated 9 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 9 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 8 years ago
- ~ BannerGrab☆25Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Removed according to regulations☆35Updated 8 years ago
- A demo of altering an opened tab after a timer☆122Updated 9 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 10 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Stargate☆95Updated 9 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- AutoBrowser Screenshot☆49Updated 8 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated 2 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago
- This repository contains some bettercap transparent proxy example modules.☆16Updated 7 years ago
- ☆86Updated 10 years ago
- Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables☆49Updated 8 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 16 years ago