PHDAYS |||
☆17May 23, 2013Updated 12 years ago
Alternatives and similar repositories for WindowsUploadToolkit
Users that are interested in WindowsUploadToolkit are comparing it to the libraries listed below
Sorting:
- This is a compilation of functions to simplify scripts to manage AD tasks☆10Apr 7, 2016Updated 9 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- ☆65May 26, 2016Updated 9 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- This is the vulnerable "proxy" I used on this article: http://resources.infosecinstitute.com/the-ssrf-vulnerability/ . A simple, non-vali…☆14Sep 20, 2016Updated 9 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆163Apr 11, 2017Updated 8 years ago
- ☆84May 19, 2015Updated 10 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Aug 20, 2020Updated 5 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- scripts for pentesting☆86Aug 21, 2018Updated 7 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆108Jul 26, 2016Updated 9 years ago
- a javascript keylogger included in a gif file☆39Aug 8, 2025Updated 7 months ago
- ☆26May 7, 2016Updated 9 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- Updated the FoxGlove Security WebLogic serialization exploit.☆31Mar 23, 2017Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- PowerShell scripts☆11Feb 19, 2018Updated 8 years ago
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- CB API scripts for IR, administration, etc.☆32Jun 3, 2019Updated 6 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Find API keys in your code.☆40Aug 18, 2021Updated 4 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- Admin Panel Finder☆39Sep 22, 2025Updated 5 months ago
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago
- Small modification version of p0wnedShell☆40Apr 25, 2016Updated 9 years ago
- Examples related to Amazon Lightsail☆12Jul 17, 2024Updated last year
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago