ruadmin is a logon *Brute Force* tool, for windows privilege escalation, but also system management.
☆97May 26, 2018Updated 7 years ago
Alternatives and similar repositories for ruadmin
Users that are interested in ruadmin are comparing it to the libraries listed below
Sorting:
- 整理收集Struts2漏洞环境☆270Jan 9, 2018Updated 8 years ago
- AggressorScript-UploadAndRunFrp/上传frpc并且运行frpc☆63Sep 1, 2019Updated 6 years ago
- Some codes for bypassing Oracle WebLogic CVE-2018-2628 patch☆114May 21, 2018Updated 7 years ago
- Java-Web-Security - Sichere Webanwendungen mit Java entwickeln☆220Feb 19, 2026Updated last week
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Aug 17, 2017Updated 8 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- ACTIVELabs Security Advisories☆24May 19, 2021Updated 4 years ago
- 甲方安全工程师必备,内部钓鱼系统☆230Jan 15, 2022Updated 4 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- A collection of C# tools for various purposes (kerberoasting, tickets, mimikatz, privesc, domain enumeration and more)☆80Aug 12, 2019Updated 6 years ago
- 跟踪真实漏洞相关靶场环境搭建☆242Jul 19, 2018Updated 7 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆174Jul 21, 2016Updated 9 years ago
- Set Up WebDAV Server for Remote File Sharing and more☆35Aug 22, 2019Updated 6 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后渗透后…☆198Aug 29, 2015Updated 10 years ago
- 自动化收集linux信息☆203Apr 26, 2018Updated 7 years ago
- Go package for fexecve(3) and execveat(2)☆15Dec 24, 2025Updated 2 months ago
- CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE☆62Jun 1, 2023Updated 2 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- flash 劫持轮子,CSRF,劫持,跳转,swf 有需求可以提issues ,src挖掘,劫持response☆86Nov 9, 2019Updated 6 years ago
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- CVE-2018-8120 Windows LPE exploit☆500May 30, 2018Updated 7 years ago
- PHP 白盒分析工具,结合AST 和数据流跟踪分析代码,达到自动化白盒审计功能☆148May 14, 2018Updated 7 years ago
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- ☆145Jun 20, 2018Updated 7 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- 基于docker虚拟化的恶意代码沙箱☆71Aug 13, 2018Updated 7 years ago
- cve-2019-0808-poc☆48Mar 25, 2019Updated 6 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- tools☆542Apr 9, 2019Updated 6 years ago
- 这是一个实验性的PHP扩展,加载这个扩展后,每次请求将可以执行一段自己的PHP代码。☆198Oct 22, 2018Updated 7 years ago
- some java code i met or i used☆29May 7, 2019Updated 6 years ago
- steal Windows Telegram Desktop session☆15Sep 8, 2020Updated 5 years ago
- Web版webshell☆12Jan 27, 2018Updated 8 years ago
- ☆16Nov 10, 2018Updated 7 years ago
- PyRat,a rat by python xmlrpc☆162Mar 23, 2018Updated 7 years ago
- Burp Suite Collaborator HTTP API☆45May 27, 2018Updated 7 years ago
- POC of https://research.checkpoint.com/extracting-code-execution-from-winrar/☆267Feb 27, 2019Updated 7 years ago