• Stars
    star
    1
  • Language
    Python
  • Created about 7 years ago
  • Updated over 6 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

ProxyPwn is a scanner and tunneler for open proxies.

More Repositories

1

ShellPop

Pop shells like a master.
Python
1,440
star
2

FakePip

Pip install exploit package
Python
150
star
3

CVE-2019-0841-BYPASS

A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.
C++
60
star
4

CVE-2018-1000001

glibc getcwd() local privilege escalation compiled binaries
C
32
star
5

Shellkiller

A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.
Shell
27
star
6

NamedPipes

Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.
C#
16
star
7

CVE-2016-2098

Ruby On Rails unrestricted render() exploit
Go
16
star
8

-CVE-2017-9805

Exploit script for Apache Struts2 REST Plugin XStream RCE (‎CVE-2017-9805)
Python
15
star
9

CVE-2019-1064

CVE-2019-1064 Local Privilege Escalation Vulnerability
C#
12
star
10

TelePreter

Telegram-based PowerShell Runspace Host
C#
11
star
11

CVE-2018-12613

PHPMyAdmin v4.8.0 and v.4.8.1 LFI exploit
PowerShell
10
star
12

CVE-2016-10033

PHPMailer < 5.2.18 Remote Code Execution Exploit
Go
7
star
13

XXE

My own repository used for testing XXE vulnerabilities in a more automated way.
Python
6
star
14

CVE-2017-5638

Struts02 s2-045 exploit program
Go
5
star
15

CVE-2018-10517

CMS Made Simple 2.2.7 RCE exploit
PowerShell
4
star
16

shemutils

Pythonic multi-task library of encryption, database, logging and checksum.
Python
3
star
17

0x00-0x00.github.io

Ruby
3
star
18

ctf_tools

Tools we (Watchers) use for CTF wargames.
C
3
star
19

CVE-2015-3224

Modification of Metasploit module for RCE in Ruby-On-Rails Console CVE-2015-3224
Ruby
2
star
20

CVE-2014-6271

Shellshock exploitation script that is able to upload and RCE using any vector due to its versatility.
Python
2
star
21

CVE-2018-10949

Zimbra Collaboration Suite Username Enumeration
Python
2
star
22

gadreel-bot

Telegram bot to help with task management and CTF wargames
Python
2
star
23

router_attack

wireless security audit repository
Python
2
star
24

decryptor

A substitution cipher decryptor that uses the operator (user) to decrypt the cipher on-the-fly.
Python
1
star
25

asyncspider

A URL brute-forcer to find hidden files from a target URL. AsyncIO.
Python
1
star
26

CTF_SecurityWeekend

Data for FATEC's 1st SecurityWeekend CTF
1
star
27

hashfind

A simple program to request to decrypthash.com to decrypt the hash given by the user.
Python
1
star
28

crypt

Crypt is a cryptography tool to protect all kinds of data using AES-256 and RSA-4096 algorithms.
Python
1
star
29

shredder

C program to erase files securely overwritting data with random patterns.
C
1
star
30

CVE-2018-7422

Wordpress plugin Site-Editor v1.1.1 LFI exploit
PowerShell
1
star
31

nichide

NicHide is a pure-C program to hide your NIC hardware address.
C
1
star
32

autobackup

C program to handle rsync and SimplePush notifications easily for my own servers.
C
1
star
33

shell_scripts

My own shell scripts used for management.
Shell
1
star
34

ReverseEngineerPractice

Reverse Engineering Tutorial Files from Lena Course
HTML
1
star
35

netcracker

WiFi auditing tool to monitor, capture and crack WPA handshakes.
Python
1
star
36

CVE-2018-15131

Zimbra Collaboration Suite Username Enumeration
Python
1
star
37

pybackdoor

poc backdoor using python and threading
C++
1
star
38

netwatch

NetWatch is a tool to monitor network hosts TCP ports, uptime and visualize scan logs.
Shell
1
star