stackoverflowin / XML-RPC-reflectionLinks
A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.
☆29Updated 8 years ago
Alternatives and similar repositories for XML-RPC-reflection
Users that are interested in XML-RPC-reflection are comparing it to the libraries listed below
Sorting:
- ☆54Updated 9 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 9 years ago
- ~ BannerGrab☆25Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 10 years ago
- Removed according to regulations☆35Updated 8 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Automatic backdooring apk with meterpreter (PoC)☆52Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 10 years ago
- AutoBrowser Screenshot☆49Updated 8 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 10 years ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆68Updated 9 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago
- Scripts that aren't PowerShell☆48Updated 5 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Updated 10 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Updated 10 years ago
- Usefull snippets / Computer-security oriented☆21Updated 8 years ago
- misc pentest tools.☆26Updated 10 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆115Updated 9 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago