☆1,005Jan 23, 2023Updated 3 years ago
Alternatives and similar repositories for php_filter_chain_generator
Users that are interested in php_filter_chain_generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆349Jan 24, 2023Updated 3 years ago
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆237Oct 8, 2024Updated last year
- A CLI to exploit parameters vulnerable to PHP filter chain error based oracle.☆325Jun 2, 2024Updated last year
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.☆3,768Sep 29, 2025Updated 5 months ago
- Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()☆504Sep 30, 2024Updated last year
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,324Apr 18, 2023Updated 2 years ago
- 专为CTF设计的Jinja2 SSTI全自动绕WAF脚本 | A Jinja2 SSTI cracker for bypassing WAF, designed for CTF☆1,250Updated this week
- ☆2,214Nov 24, 2023Updated 2 years ago
- Monitor linux processes without root permissions☆5,939Mar 1, 2026Updated 3 weeks ago
- Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.☆631Dec 3, 2024Updated last year
- Tool for Active Directory Certificate Services enumeration and abuse☆3,436Feb 28, 2026Updated 3 weeks ago
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,351Jul 12, 2024Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,366Feb 15, 2026Updated last month
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆733Sep 3, 2025Updated 6 months ago
- ☆28Oct 18, 2022Updated 3 years ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,122Feb 27, 2026Updated 3 weeks ago
- CTF-Java-Gadget专注于收集CTF中Java赛题的反序列化片段☆282Dec 13, 2024Updated last year
- Tools for Kerberos PKINIT and relaying to AD CS☆887Jan 3, 2025Updated last year
- A tool to perform Kerberos pre-auth bruteforcing☆3,279Aug 20, 2024Updated last year
- The Network Execution Tool☆5,356Updated this week
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆675May 3, 2020Updated 5 years ago
- Python version of the C# tool for "Shadow Credentials" attacks☆865Feb 14, 2026Updated last month
- A tool to dump a git repository from a website☆2,471Feb 28, 2026Updated 3 weeks ago
- Compiled Binaries for Ghostpack☆1,620Oct 24, 2024Updated last year
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,362Sep 22, 2025Updated 6 months ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,812Dec 4, 2025Updated 3 months ago
- exec BashCommand with only ! # $ ' ( ) < \ { } just 10 charset used in Bypass or CTF☆265Aug 14, 2024Updated last year
- Neo-reGeorg is a project that seeks to aggressively refactor reGeorg☆3,327Mar 11, 2026Updated 2 weeks ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,539Updated this week
- Java RMI Vulnerability Scanner☆915Jul 3, 2024Updated last year
- Magic hashes – PHP hash "collisions"☆828Mar 23, 2025Updated last year
- Deserialization payload generator for a variety of .NET formatters☆3,691Dec 23, 2024Updated last year
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆144Oct 27, 2019Updated 6 years ago
- Powerview on steroids☆903Mar 10, 2026Updated 2 weeks ago
- Automatically converts Python source code to Pickle opcode☆164Jan 2, 2025Updated last year
- Username tools for penetration testing☆1,341Sep 20, 2024Updated last year
- Another Windows Local Privilege Escalation from Service Account to System☆947Nov 12, 2022Updated 3 years ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,560Mar 11, 2026Updated last week
- 通过jar包快速生成patch模版☆52Jul 29, 2023Updated 2 years ago