z-jxy / keepass_dump
KeePass 2.X dumper (CVE-2023-32784)
☆19Updated last year
Alternatives and similar repositories for keepass_dump
Users that are interested in keepass_dump are comparing it to the libraries listed below
Sorting:
- CVE-2023-2255 Libre Office☆58Updated last year
- ☆41Updated 7 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆72Updated 8 months ago
- Openfire Console Authentication Bypass Vulnerability with RCE plugin☆51Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆86Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆51Updated 4 months ago
- Exploit to dump ipmi hashes☆34Updated 2 years ago
- Script to retrieve the master password of a keepass database <= 2.53.1☆100Updated last year
- ☆32Updated last year
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 7 months ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 3 months ago
- This is poc of CVE-2022-46169 authentication bypass and remote code execution☆16Updated last year
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆13Updated 4 years ago
- Precompiled executable☆53Updated 2 months ago
- ☆38Updated 3 weeks ago
- A cheatsheet for NetExec☆118Updated 3 months ago
- Impacket is a collection of Python classes for working with network protocols.☆71Updated 8 months ago
- POC for CVE-2020-13151☆30Updated 4 years ago
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆114Updated 2 years ago
- ☆113Updated last year
- Get a reverse shell using PostgreSQL☆19Updated 8 months ago
- Crackmapexec custom scripts used in my internal pentests.☆24Updated last year
- A webshell plugin and interactive shell for pentesting a WordPress website.☆85Updated last year
- ☆52Updated 3 months ago
- A webshell plugin and interactive shell for pentesting a Joomla website.☆51Updated 2 years ago
- CLI monitor for windows process- & file activity☆87Updated 4 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆124Updated last year
- Creating a Malicious Macro using MS Word☆22Updated 2 years ago
- ☆85Updated 3 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆44Updated 2 years ago