zzzteph / weakpassLinks
Weakpass collection of tools for bruteforce and hashcracking
☆636Updated last month
Alternatives and similar repositories for weakpass
Users that are interested in weakpass are comparing it to the libraries listed below
Sorting:
- Multiplatform Python WebShell☆318Updated last year
- A browser extension for Penetration Testing☆544Updated 2 months ago
- A python script to scan for Apache Tomcat server vulnerabilities.☆870Updated 2 weeks ago
- PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017☆126Updated 2 years ago
- Harvest passwords automatically from OpenSSH server☆376Updated 2 years ago
- Automatic SSTI detection tool with interactive interface☆1,273Updated 3 months ago
- An XSS Exploitation Tool☆325Updated 4 months ago
- A webshell that can bypass some system security, all code has been obfuscated to bypass malware scans freely.☆251Updated last year
- JSshell - JavaScript reverse/remote shell☆626Updated 2 years ago
- A tool for creating hidden accounts using the registry || 一个使用注册表创建隐藏帐户的工具☆482Updated 3 years ago
- Script for generating revshells☆478Updated last year
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆213Updated last year
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆437Updated 2 years ago
- ☆56Updated 4 years ago
- command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can explo…☆284Updated 4 years ago
- Obtain a user's system password, this tool uses the su binary to perform a brute force attack until a successful collision occurs.☆50Updated 7 months ago
- Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits☆176Updated 5 months ago
- Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938)☆402Updated 5 years ago
- Automating Host Exploitation with AI☆549Updated 3 years ago
- NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications☆336Updated 7 months ago
- OWASP PTK - application security browser extension.☆160Updated last week
- HVNC for Cobalt Strike☆1,283Updated last year
- ☆2,109Updated last year
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆479Updated 2 months ago
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆397Updated 2 months ago
- Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.☆160Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆770Updated 10 months ago
- Python exploit code for CVE-2021-4034 (pwnkit)☆171Updated 3 years ago
- PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC☆299Updated last year
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆381Updated last year