☆994Jan 23, 2023Updated 3 years ago
Alternatives and similar repositories for php_filter_chain_generator
Users that are interested in php_filter_chain_generator are comparing it to the libraries listed below
Sorting:
- ☆349Jan 24, 2023Updated 3 years ago
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆236Oct 8, 2024Updated last year
- A CLI to exploit parameters vulnerable to PHP filter chain error based oracle.☆326Jun 2, 2024Updated last year
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.☆3,753Sep 29, 2025Updated 5 months ago
- Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()☆505Sep 30, 2024Updated last year
- 专为CTF设计的Jinja2 SSTI全自动绕WAF脚本 | A Jinja2 SSTI cracker for bypassing WAF, designed for CTF☆1,233Updated this week
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,302Apr 18, 2023Updated 2 years ago
- ☆2,202Nov 24, 2023Updated 2 years ago
- Monitor linux processes without root permissions☆5,902Updated this week
- Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.☆625Dec 3, 2024Updated last year
- Tool for Active Directory Certificate Services enumeration and abuse☆3,406Updated this week
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,341Jul 12, 2024Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,301Feb 15, 2026Updated 2 weeks ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,098Updated this week
- exec BashCommand with only ! # $ ' ( ) < \ { } just 10 charset used in Bypass or CTF☆264Aug 14, 2024Updated last year
- Tools for Kerberos PKINIT and relaying to AD CS☆882Jan 3, 2025Updated last year
- CTF-Java-Gadget专注于收集CTF中Java赛题的反序列化片段☆276Dec 13, 2024Updated last year
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆730Sep 3, 2025Updated 6 months ago
- Python version of the C# tool for "Shadow Credentials" attacks☆861Feb 14, 2026Updated 2 weeks ago
- The Network Execution Tool☆5,296Updated this week
- A tool to perform Kerberos pre-auth bruteforcing☆3,255Aug 20, 2024Updated last year
- Compiled Binaries for Ghostpack☆1,608Oct 24, 2024Updated last year
- Java RMI Vulnerability Scanner☆915Jul 3, 2024Updated last year
- ☆28Oct 18, 2022Updated 3 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,350Sep 22, 2025Updated 5 months ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆674May 3, 2020Updated 5 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,765Dec 4, 2025Updated 3 months ago
- Neo-reGeorg is a project that seeks to aggressively refactor reGeorg☆3,315Jan 4, 2026Updated 2 months ago
- Powerview on steroids☆875Updated this week
- A tool to dump a git repository from a website☆2,443Updated this week
- Deserialization payload generator for a variety of .NET formatters☆3,679Dec 23, 2024Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,384Updated this week
- Another Windows Local Privilege Escalation from Service Account to System☆939Nov 12, 2022Updated 3 years ago
- Magic hashes – PHP hash "collisions"☆822Mar 23, 2025Updated 11 months ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,537Jan 27, 2025Updated last year
- The ultimate WinRM shell for hacking/pentesting☆5,260Feb 20, 2026Updated last week
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,188Jan 5, 2026Updated last month
- Active Directory certificate abuse.☆1,921Oct 27, 2025Updated 4 months ago
- Username tools for penetration testing☆1,333Sep 20, 2024Updated last year