zzzteph / weakpassLinks
Weakpass collection of tools for bruteforce and hashcracking
☆660Updated last month
Alternatives and similar repositories for weakpass
Users that are interested in weakpass are comparing it to the libraries listed below
Sorting:
- Multiplatform Python WebShell☆319Updated last month
- A browser extension for Penetration Testing☆554Updated 4 months ago
- Obtain a user's system password, this tool uses the su binary to perform a brute force attack until a successful collision occurs.☆52Updated 9 months ago
- Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits☆182Updated 7 months ago
- A python script to scan for Apache Tomcat server vulnerabilities.☆887Updated last week
- Automatic SSTI detection tool with interactive interface☆1,325Updated last month
- Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938)☆403Updated 5 years ago
- ☆62Updated 4 years ago
- PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017☆130Updated 2 years ago
- JSshell - JavaScript reverse/remote shell☆630Updated 3 years ago
- Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.☆163Updated 2 years ago
- ☆2,166Updated 2 years ago
- Python exploit code for CVE-2021-4034 (pwnkit)☆170Updated 3 years ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆445Updated 2 years ago
- A tool for creating hidden accounts using the registry || 一个使用注册表创建隐藏帐户的工具☆484Updated 3 years ago
- OWASP PTK - application security browser extension.☆168Updated this week
- Script for generating revshells☆478Updated last year
- Netcat for windows 32/64 bit☆766Updated last year
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆402Updated last year
- PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC☆304Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆779Updated last year
- command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can explo…☆291Updated 4 years ago
- HVNC for Cobalt Strike☆1,292Updated 2 years ago
- A simple tool for bypassing file upload restrictions.☆888Updated last year
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆959Updated 2 years ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆513Updated last year
- Harvest passwords automatically from OpenSSH server☆375Updated 2 years ago
- Repo containing cracked red teaming tools.☆215Updated 2 months ago
- An XSS Exploitation Tool☆336Updated last month
- A webshell that can bypass some system security, all code has been obfuscated to bypass malware scans freely.☆257Updated last year