ZTE ZXV10 H108L Router with <= V1.0.01_WIND_A01 - Remote root RCE Exploit
☆52Sep 21, 2016Updated 9 years ago
Alternatives and similar repositories for ZTExploit
Users that are interested in ZTExploit are comparing it to the libraries listed below
Sorting:
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆84Mar 8, 2018Updated 7 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- BurpJDSer-ng☆29Feb 26, 2026Updated last week
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- CVE-2019-10392 RCE Jackson with Git Client Plugin 2.8.2 (Authenticated)☆21Sep 26, 2019Updated 6 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- A collection of hex utilities in python☆14Mar 1, 2013Updated 13 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- 一个用来xss劫持会话利用的chrome插件☆13Sep 3, 2014Updated 11 years ago
- Writeups from various CTFs solved with Mathematica☆10Apr 15, 2017Updated 8 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Reversing Google Drive and other goodies ;)☆27Sep 26, 2013Updated 12 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 12 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30May 29, 2015Updated 10 years ago
- http://x0day.me/archives/bannerscan-py.html☆53Sep 4, 2014Updated 11 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- ☆18Feb 4, 2016Updated 10 years ago
- Advanced XPath Injection Tool☆33Jan 29, 2026Updated last month
- Just a collection of scripts☆40Apr 15, 2020Updated 5 years ago
- A REPL for the Android Debug Bridge (ADB)☆126Nov 30, 2014Updated 11 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago