stackoverflowin / XML-RPC-reflectionLinks
A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.
☆29Updated 8 years ago
Alternatives and similar repositories for XML-RPC-reflection
Users that are interested in XML-RPC-reflection are comparing it to the libraries listed below
Sorting:
- ☆54Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- ☆42Updated 11 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- Removed according to regulations☆35Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 8 years ago
- Collection of metasploit modules☆68Updated 8 years ago
- Scripts that aren't PowerShell☆48Updated 5 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆85Updated 6 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 9 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆68Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆38Updated 7 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago