zzzteph / weakpassLinks
Weakpass collection of tools for bruteforce and hashcracking
☆599Updated 2 weeks ago
Alternatives and similar repositories for weakpass
Users that are interested in weakpass are comparing it to the libraries listed below
Sorting:
- Multiplatform Python WebShell☆318Updated 10 months ago
- ☆2,028Updated last year
- A tool for creating hidden accounts using the registry || 一个使用注册表创建隐藏帐户的工具☆478Updated 3 years ago
- A browser extension for Penetration Testing☆531Updated 7 months ago
- HVNC for Cobalt Strike☆1,254Updated last year
- ↕️🤫 Stealth redirector for your red team operation security☆705Updated last month
- An XSS Exploitation Tool☆318Updated last month
- Automatic SSTI detection tool with interactive interface☆1,154Updated this week
- A webshell that can bypass some system security, all code has been obfuscated to bypass malware scans freely.☆247Updated 9 months ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆481Updated 2 years ago
- A python script to scan for Apache Tomcat server vulnerabilities.☆848Updated last week
- PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017☆120Updated last year
- Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938)☆398Updated 5 years ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆437Updated last year
- Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits☆166Updated 2 months ago
- ☆44Updated 4 years ago
- ☆229Updated 5 years ago
- Automatically spawn a reverse shell fully interactive for Linux or Windows victim☆356Updated 2 years ago
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆395Updated 6 months ago
- Python exploit code for CVE-2021-4034 (pwnkit)☆169Updated 3 years ago
- OWASP PTK - application security browser extension.☆153Updated 2 months ago
- Automating Host Exploitation with AI☆540Updated 2 years ago
- Harvest passwords automatically from OpenSSH server☆375Updated 2 years ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆442Updated 2 years ago
- zerosum0x0's Koadic☆309Updated 3 years ago
- Script for generating revshells☆476Updated 11 months ago
- command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can explo…☆273Updated 3 years ago
- JSshell - JavaScript reverse/remote shell☆629Updated 2 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆914Updated 2 years ago
- ☆1,669Updated last week