PHDAYS |||
☆17May 23, 2013Updated 12 years ago
Alternatives and similar repositories for WindowsUploadToolkit
Users that are interested in WindowsUploadToolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- ☆65May 26, 2016Updated 9 years ago
- Windows privilege escalation workstation☆17Nov 22, 2015Updated 10 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- This is a compilation of functions to simplify scripts to manage AD tasks☆10Apr 7, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆163Apr 11, 2017Updated 8 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- This is the vulnerable "proxy" I used on this article: http://resources.infosecinstitute.com/the-ssrf-vulnerability/ . A simple, non-vali…☆14Sep 20, 2016Updated 9 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- ☆84May 19, 2015Updated 10 years ago
- scripts for pentesting☆86Aug 21, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆27Jul 18, 2017Updated 8 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- ☆11Aug 2, 2016Updated 9 years ago
- PrOfESSOS is our open source implementation for fully automated Evaluation-as-a-Service for SSO. PrOfESSOS introduces a generic approach …☆29Jan 8, 2023Updated 3 years ago
- ☆32Feb 7, 2018Updated 8 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Apr 15, 2023Updated 2 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- A curated list of awesome resources for tracking vulnerabilities in software☆18May 4, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- a javascript keylogger included in a gif file☆39Aug 8, 2025Updated 7 months ago
- A database of options to use when pen testing an application. Sample XSS, SQLi and much more. It's been gathered over time. It's not perf…☆16Oct 21, 2020Updated 5 years ago
- Shellcode异或加密工具☆12Mar 23, 2017Updated 9 years ago
- InfoPath Phishing Repo Resource☆68Oct 26, 2017Updated 8 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆108Jul 26, 2016Updated 9 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- Study about HQL injection exploitation.☆52May 15, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ARM to pseudo code converter that rarely works☆14Dec 21, 2017Updated 8 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 9 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Aug 20, 2020Updated 5 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 3 months ago
- ☆26May 7, 2016Updated 9 years ago