wildkindcc / CVE-2018-9276View external linksLinks
CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)
☆36Dec 3, 2020Updated 5 years ago
Alternatives and similar repositories for CVE-2018-9276
Users that are interested in CVE-2018-9276 are comparing it to the libraries listed below
Sorting:
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- CVE-2019-16113 - bludit >= 3.9.2 RCE authenticate☆13Jun 5, 2020Updated 5 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- ☆14Sep 13, 2021Updated 4 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆269Jan 4, 2018Updated 8 years ago
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 2 weeks ago
- ☆23Nov 29, 2023Updated 2 years ago
- Metabase Pre-auth RCE☆12Aug 3, 2023Updated 2 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.☆12Aug 2, 2020Updated 5 years ago
- POC script for the ManageEngine Multiple Products Authenticated File Upload Exploit☆13Jun 26, 2017Updated 8 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- A proof of concept exploit that tries to pop you a shell on a uftpd server between versions 2.6 and 2.10☆20Apr 16, 2020Updated 5 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆18Nov 12, 2021Updated 4 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Nov 12, 2025Updated 3 months ago
- Some exploits to bypass Safer Mode in Ghostscript☆18Oct 24, 2020Updated 5 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Vulnerable rails application that is configurable in its vulnerability☆20Jun 4, 2018Updated 7 years ago
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- FLUXION☆22Oct 3, 2016Updated 9 years ago
- ☆20Feb 13, 2016Updated 10 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 2 months ago
- ☆17May 29, 2015Updated 10 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- vBulletin 5.x 未授权远程代码执行漏洞☆21Sep 26, 2019Updated 6 years ago
- WallEscape vulnerability in util-linux☆51Mar 30, 2024Updated last year