A PoC exploit for CVE-2017-9841 - PHPUnit Remote Code Execution(RCE)
-
Updated
Jul 6, 2025 - Go
A PoC exploit for CVE-2017-9841 - PHPUnit Remote Code Execution(RCE)
An API-first framework for automating the detection and testing of known attack vectors in Active Directory environments. The framework streamlines the enumeration and exploitation of vulnerabilities, such as PrintNightmare, Zerologon, and EternalBlue. Built with GoLang, it integrates tools like nmap and NetExec while utilizing a graph database
An undetectable GO implemented reverse shell
A Simple Tool to gather information from any website, domain, sub-domain, DNS, links by enumeration with simple commands.
GraphSpecter is a tool to audit GraphQL API
An iOS backup extraction tool written in Golang
SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configuration
A multiple reverse shell sessions/clients manager via terminal written in go
🌒 Shell command obfuscation to avoid detection systems
A container analysis and exploitation tool for pentesters and engineers.
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."