tkisason / KillApachePy
Python Apache Killer (Range Header DoS CVE-2011-3192)
☆13Updated 13 years ago
Alternatives and similar repositories for KillApachePy:
Users that are interested in KillApachePy are comparing it to the libraries listed below
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Find infected ms17-010 machines☆12Updated 7 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Repo for proof of concept exploits and tools.☆56Updated 4 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆52Updated 6 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Red Login: SSH Brute-force Tools☆103Updated 6 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- POC of sudo password stealer☆37Updated 4 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆22Updated 6 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆35Updated 5 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆32Updated 9 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆37Updated 4 years ago
- Remote Desktop Protocol in Twisted Python☆26Updated 7 years ago
- C# AV bypass jank☆32Updated 4 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Burp Extension to manipulate AES encrypted payloads☆14Updated 3 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- Dependencies for Veil 3☆18Updated 8 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- a hash query tool☆37Updated 6 years ago
- All about the remote administrative tools☆36Updated 9 years ago
- Metasploit reverse TCP stager fully undetectable☆17Updated 9 years ago
- A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418☆35Updated 6 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year