takabaya-shi / LFI2RCE
LFI to RCE tool.
☆15Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for LFI2RCE
- Notes for CRTP☆39Updated 3 years ago
- ☆30Updated 4 years ago
- ☆26Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆68Updated 2 years ago
- ☆41Updated 4 years ago
- ☆39Updated 11 months ago
- Get GTFOBins info about a given exploit from the command line☆36Updated 3 months ago
- A cheat sheet for CrackMapExec and NetExec☆48Updated 4 months ago
- Repo for OSWE related video content for @SecAura Youtube Channel☆30Updated 2 years ago
- ☆52Updated 6 months ago
- ☆32Updated last year
- Tool to enable blind sql injection attacks against websockets using sqlmap☆57Updated last year
- ☆65Updated last year
- A Python based ingestor for BloodHound☆81Updated 2 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆57Updated 9 months ago
- Review of AWAE.OSWE☆30Updated 2 years ago
- ☆64Updated last year
- Transition form local file inclusion attacks to remote code exection☆48Updated 4 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆83Updated last year
- OSWE Preparation☆37Updated 5 years ago
- ☆16Updated 6 months ago
- ☆47Updated 2 years ago
- ☆62Updated 2 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆13Updated last year
- this script will help you find favicon hashes which you can use to shodan to get more details about an asset☆26Updated 9 months ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆77Updated last year
- Archived Please go to https://github.com/adamjsturge/xsshunter-go☆31Updated 8 months ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆19Updated 2 years ago
- ☆45Updated 5 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago