xiaoxiaoleo / pentest-scriptLinks
Script for pentest
☆39Updated 4 years ago
Alternatives and similar repositories for pentest-script
Users that are interested in pentest-script are comparing it to the libraries listed below
Sorting:
- cve-2019-0604 SharePoint RCE exploit☆100Updated 5 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆53Updated 6 years ago
- It is a simple script to exploit RCE for Samba (CVE-2017-7494 ).☆55Updated 3 years ago
- WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit☆48Updated 5 years ago
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆146Updated 5 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- Custom THP Dropper☆26Updated 7 years ago
- Learn how to get a reverse shell from JIRA application server☆24Updated 6 years ago
- Environment for CVE-2019-6340 (Drupal)☆43Updated 2 years ago
- checkO365 is a tool to check if a target domain is using O365☆84Updated 7 years ago
- WebLogic Exploit☆142Updated 6 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆127Updated 2 years ago
- A DNS tunnel utilizing the Burp Collaborator☆102Updated 5 years ago
- ☆63Updated 5 years ago
- CVE-2019-15107 Webmin RCE (unauthorized)☆63Updated 5 years ago
- Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect☆132Updated 3 years ago
- sploit☆68Updated 5 years ago
- CVE-2018-2893-PoC☆103Updated 6 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Updated 6 years ago
- Collection of Windows Hacking Binaries☆50Updated 10 years ago
- Metasploit msfvenom Bash Completions Generator☆42Updated 8 years ago
- BMC Bladelogic RSCD exploits including remote code execution - CVE-2016-1542, CVE-2016-1543, CVE-2016-5063☆20Updated 5 years ago
- Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container☆47Updated last year
- ☆43Updated 5 years ago
- Java serialization brute force attack tool.☆123Updated 7 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- Here you can get full exploit for SAP NetWeaver AS JAVA☆76Updated 7 years ago
- Malleable C2 profiles for Cobalt Strike☆72Updated 2 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆122Updated 6 years ago