Metasploit modules
There are currently 5689 Metasploit modules:
- All Modules
- auxiliary (1264)
- admin (223)
- 2wire (1)
- android (1)
- appletv (2)
- atg (1)
- aws (1)
- backupexec (2)
- chromecast (2)
- citrix (1)
- db2 (1)
- dcerpc (4)
- dns (1)
- edirectory (2)
- emc (2)
- firetv (1)
- hp (3)
- http (89)
- auxiliary/admin/http/allegro_rompager_auth_bypass
- auxiliary/admin/http/arris_motorola_surfboard_backdoor_xss
- auxiliary/admin/http/atlassian_confluence_auth_bypass
- auxiliary/admin/http/axigen_file_access
- auxiliary/admin/http/cfme_manageiq_evm_pass_reset
- auxiliary/admin/http/cisco_7937g_ssh_privesc
- auxiliary/admin/http/cisco_ios_xe_cli_exec_cve_2023_20198
- auxiliary/admin/http/cisco_ios_xe_os_exec_cve_2023_20273
- auxiliary/admin/http/cisco_ssm_onprem_account
- auxiliary/admin/http/cnpilot_r_cmd_exec
- auxiliary/admin/http/cnpilot_r_fpt
- auxiliary/admin/http/contentkeeper_fileaccess
- auxiliary/admin/http/dlink_dir_300_600_exec_noauth
- auxiliary/admin/http/dlink_dir_645_password_extractor
- auxiliary/admin/http/dlink_dsl320b_password_extractor
- auxiliary/admin/http/foreman_openstack_satellite_priv_esc
- auxiliary/admin/http/fortra_filecatalyst_workflow_sqli
- auxiliary/admin/http/gitlab_password_reset_account_takeover
- auxiliary/admin/http/gitstack_rest
- auxiliary/admin/http/grafana_auth_bypass
- auxiliary/admin/http/hikvision_unauth_pwd_reset_cve_2017_7921
- auxiliary/admin/http/hp_web_jetadmin_exec
- auxiliary/admin/http/ibm_drm_download
- auxiliary/admin/http/idsecure_auth_bypass
- auxiliary/admin/http/iis_auth_bypass
- auxiliary/admin/http/intersil_pass_reset
- auxiliary/admin/http/iomega_storcenterpro_sessionid
- auxiliary/admin/http/ivanti_vtm_admin
- auxiliary/admin/http/jboss_bshdeployer
- auxiliary/admin/http/jboss_deploymentfilerepository
- auxiliary/admin/http/jboss_seam_exec
- auxiliary/admin/http/joomla_registration_privesc
- auxiliary/admin/http/kaseya_master_admin
- auxiliary/admin/http/katello_satellite_priv_esc
- auxiliary/admin/http/limesurvey_file_download
- auxiliary/admin/http/linksys_e1500_e2500_exec
- auxiliary/admin/http/linksys_tmunblock_admin_reset_bof
- auxiliary/admin/http/linksys_wrt54gl_exec
- auxiliary/admin/http/manage_engine_dc_create_admin
- auxiliary/admin/http/manageengine_dir_listing
- auxiliary/admin/http/manageengine_file_download
- auxiliary/admin/http/manageengine_pmp_privesc
- auxiliary/admin/http/mantisbt_password_reset
- auxiliary/admin/http/mutiny_frontend_read_delete
- auxiliary/admin/http/netflow_file_download
- auxiliary/admin/http/netgear_auth_download
- auxiliary/admin/http/netgear_pnpx_getsharefolderlist_auth_bypass
- auxiliary/admin/http/netgear_r6700_pass_reset
- auxiliary/admin/http/netgear_r7000_backup_cgi_heap_overflow_rce
- auxiliary/admin/http/netgear_soap_password_extractor
- auxiliary/admin/http/netgear_wnr2000_pass_recovery
- auxiliary/admin/http/nexpose_xxe_file_read
- auxiliary/admin/http/novell_file_reporter_filedelete
- auxiliary/admin/http/nuuo_nvrmini_reset
- auxiliary/admin/http/openbravo_xxe
- auxiliary/admin/http/pfadmin_set_protected_alias
- auxiliary/admin/http/pihole_domains_api_exec
- auxiliary/admin/http/rails_devise_pass_reset
- auxiliary/admin/http/scadabr_credential_dump
- auxiliary/admin/http/scrutinizer_add_user
- auxiliary/admin/http/sophos_wpa_traversal
- auxiliary/admin/http/supra_smart_cloud_tv_rfi
- auxiliary/admin/http/sysaid_admin_acct
- auxiliary/admin/http/sysaid_file_download
- auxiliary/admin/http/sysaid_sql_creds
- auxiliary/admin/http/telpho10_credential_dump
- auxiliary/admin/http/tomcat_administration
- auxiliary/admin/http/tomcat_ghostcat
- auxiliary/admin/http/tomcat_utf8_traversal
- auxiliary/admin/http/trendmicro_dlp_traversal
- auxiliary/admin/http/typo3_news_module_sqli
- auxiliary/admin/http/typo3_sa_2009_001
- auxiliary/admin/http/typo3_sa_2009_002
- auxiliary/admin/http/typo3_sa_2010_020
- auxiliary/admin/http/typo3_winstaller_default_enc_keys
- auxiliary/admin/http/ulterius_file_download
- auxiliary/admin/http/vbulletin_upgrade_admin
- auxiliary/admin/http/webnms_cred_disclosure
- auxiliary/admin/http/webnms_file_download
- auxiliary/admin/http/whatsup_gold_sqli
- auxiliary/admin/http/wp_automatic_plugin_privesc
- auxiliary/admin/http/wp_custom_contact_forms
- auxiliary/admin/http/wp_easycart_privilege_escalation
- auxiliary/admin/http/wp_gdpr_compliance_privesc
- auxiliary/admin/http/wp_google_maps_sqli
- auxiliary/admin/http/wp_masterstudy_privesc
- auxiliary/admin/http/wp_symposium_sql_injection
- auxiliary/admin/http/wp_wplms_privilege_escalation
- auxiliary/admin/http/zyxel_admin_password_extractor
- kerberos (6)
- ldap (4)
- maxdb (1)
- misc (2)
- motorola (1)
- ms (1)
- mssql (15)
- auxiliary/admin/mssql/mssql_enum
- auxiliary/admin/mssql/mssql_enum_domain_accounts
- auxiliary/admin/mssql/mssql_enum_domain_accounts_sqli
- auxiliary/admin/mssql/mssql_enum_sql_logins
- auxiliary/admin/mssql/mssql_escalate_dbowner
- auxiliary/admin/mssql/mssql_escalate_dbowner_sqli
- auxiliary/admin/mssql/mssql_escalate_execute_as
- auxiliary/admin/mssql/mssql_escalate_execute_as_sqli
- auxiliary/admin/mssql/mssql_exec
- auxiliary/admin/mssql/mssql_findandsampledata
- auxiliary/admin/mssql/mssql_idf
- auxiliary/admin/mssql/mssql_ntlm_stealer
- auxiliary/admin/mssql/mssql_ntlm_stealer_sqli
- auxiliary/admin/mssql/mssql_sql
- auxiliary/admin/mssql/mssql_sql_file
- mysql (2)
- natpmp (1)
- netbios (1)
- networking (13)
- auxiliary/admin/networking/arista_config
- auxiliary/admin/networking/brocade_config
- auxiliary/admin/networking/cisco_asa_extrabacon
- auxiliary/admin/networking/cisco_config
- auxiliary/admin/networking/cisco_dcnm_auth_bypass
- auxiliary/admin/networking/cisco_dcnm_download
- auxiliary/admin/networking/cisco_secure_acs_bypass
- auxiliary/admin/networking/cisco_vpn_3000_ftp_bypass
- auxiliary/admin/networking/f5_config
- auxiliary/admin/networking/juniper_config
- auxiliary/admin/networking/mikrotik_config
- auxiliary/admin/networking/ubiquiti_config
- auxiliary/admin/networking/vyos_config
- officescan (1)
- oracle (12)
- post_exploitation (2)
- auxiliary/admin/oracle/ora_ntlm_stealer
- auxiliary/admin/oracle/oracle_index_privesc
- auxiliary/admin/oracle/oracle_login
- auxiliary/admin/oracle/oracle_sql
- auxiliary/admin/oracle/oraenum
- auxiliary/admin/oracle/osb_execqr
- auxiliary/admin/oracle/osb_execqr2
- auxiliary/admin/oracle/osb_execqr3
- auxiliary/admin/oracle/sid_brute
- auxiliary/admin/oracle/tnscmd
- pop2 (1)
- postgres (2)
- sap (5)
- scada (10)
- auxiliary/admin/scada/advantech_webaccess_dbvisitor_sqli
- auxiliary/admin/scada/ge_proficy_substitute_traversal
- auxiliary/admin/scada/modicon_command
- auxiliary/admin/scada/modicon_password_recovery
- auxiliary/admin/scada/modicon_stux_transfer
- auxiliary/admin/scada/moxa_credentials_recovery
- auxiliary/admin/scada/multi_cip_command
- auxiliary/admin/scada/pcom_command
- auxiliary/admin/scada/phoenix_command
- auxiliary/admin/scada/yokogawa_bkbcopyd_client
- serverprotect (1)
- smb (9)
- auxiliary/admin/smb/check_dir_file
- auxiliary/admin/smb/delete_file
- auxiliary/admin/smb/download_file
- auxiliary/admin/smb/list_directory
- auxiliary/admin/smb/ms17_010_command
- auxiliary/admin/smb/psexec_ntdsgrab
- auxiliary/admin/smb/samba_symlink_traversal
- auxiliary/admin/smb/upload_file
- auxiliary/admin/smb/webexec_command
- sunrpc (1)
- teradata (1)
- tftp (1)
- tikiwiki (1)
- upnp (1)
- vmware (6)
- vnc (1)
- vxworks (4)
- webmin (2)
- wemo (1)
- zend (1)
- auxiliary/admin/registry_security_descriptor
- analyze (9)
- bnat (2)
- client (6)
- cloud (5)
- crawler (1)
- docx (1)
- dos (116)
- android (1)
- apple_ios (1)
- cisco (4)
- dhcp (1)
- dns (3)
- freebsd (1)
- ftp (1)
- hp (1)
- http (34)
- auxiliary/dos/http/3com_superstack_switch
- auxiliary/dos/http/apache_commons_fileupload_dos
- auxiliary/dos/http/apache_mod_isapi
- auxiliary/dos/http/apache_range_dos
- auxiliary/dos/http/apache_tomcat_transfer_encoding
- auxiliary/dos/http/brother_debut_dos
- auxiliary/dos/http/cable_haunt_websocket_dos
- auxiliary/dos/http/canon_wireless_printer
- auxiliary/dos/http/dell_openmanage_post
- auxiliary/dos/http/f5_bigip_apm_max_sessions
- auxiliary/dos/http/flexense_http_server_dos
- auxiliary/dos/http/gzip_bomb_dos
- auxiliary/dos/http/hashcollision_dos
- auxiliary/dos/http/ibm_lotus_notes
- auxiliary/dos/http/ibm_lotus_notes2
- auxiliary/dos/http/marked_redos
- auxiliary/dos/http/metasploit_httphandler_dos
- auxiliary/dos/http/monkey_headers
- auxiliary/dos/http/ms15_034_ulonglongadd
- auxiliary/dos/http/nodejs_pipelining
- auxiliary/dos/http/novell_file_reporter_heap_bof
- auxiliary/dos/http/rails_action_view
- auxiliary/dos/http/rails_json_float_dos
- auxiliary/dos/http/slowloris
- auxiliary/dos/http/sonicwall_ssl_format
- auxiliary/dos/http/squid_range_dos
- auxiliary/dos/http/tautulli_shutdown_exec
- auxiliary/dos/http/ua_parser_js_redos
- auxiliary/dos/http/webkitplus
- auxiliary/dos/http/webrick_regex
- auxiliary/dos/http/wordpress_directory_traversal_dos
- auxiliary/dos/http/wordpress_long_password_dos
- auxiliary/dos/http/wordpress_xmlrpc_dos
- auxiliary/dos/http/ws_dos
- mdns (1)
- mirageos (1)
- misc (4)
- ntp (1)
- pptp (1)
- rpc (1)
- samba (3)
- sap (1)
- scada (6)
- smb (1)
- smtp (1)
- solaris (1)
- ssl (3)
- syslog (1)
- tcp (3)
- upnp (1)
- windows (35)
- appian (1)
- browser (1)
- ftp (11)
- auxiliary/dos/windows/ftp/filezilla_admin_user
- auxiliary/dos/windows/ftp/filezilla_server_port
- auxiliary/dos/windows/ftp/guildftp_cwdlist
- auxiliary/dos/windows/ftp/iis75_ftpd_iac_bof
- auxiliary/dos/windows/ftp/iis_list_exhaustion
- auxiliary/dos/windows/ftp/solarftp_user
- auxiliary/dos/windows/ftp/titan626_site
- auxiliary/dos/windows/ftp/vicftps50_list
- auxiliary/dos/windows/ftp/winftp230_nlst
- auxiliary/dos/windows/ftp/xmeasy560_nlst
- auxiliary/dos/windows/ftp/xmeasy570_nlst
- games (1)
- http (3)
- llmnr (1)
- nat (1)
- rdp (1)
- smb (11)
- auxiliary/dos/windows/smb/ms05_047_pnp
- auxiliary/dos/windows/smb/ms06_035_mailslot
- auxiliary/dos/windows/smb/ms06_063_trans
- auxiliary/dos/windows/smb/ms09_001_write
- auxiliary/dos/windows/smb/ms09_050_smb2_negotiate_pidhigh
- auxiliary/dos/windows/smb/ms09_050_smb2_session_logoff
- auxiliary/dos/windows/smb/ms10_006_negotiate_response_loop
- auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow
- auxiliary/dos/windows/smb/ms11_019_electbowser
- auxiliary/dos/windows/smb/rras_vls_null_deref
- auxiliary/dos/windows/smb/vista_negotiate_stop
- smtp (1)
- ssh (1)
- tftp (2)
- wireshark (4)
- fileformat (3)
- fuzzers (21)
- gather (155)
- auxiliary/gather/adobe_coldfusion_fileread_cve_2023_26360
- auxiliary/gather/advantech_webaccess_creds
- auxiliary/gather/alienvault_iso27001_sqli
- auxiliary/gather/alienvault_newpolicyform_sqli
- auxiliary/gather/android_browser_file_theft
- auxiliary/gather/android_browser_new_tab_cookie_theft
- auxiliary/gather/android_htmlfileprovider
- auxiliary/gather/android_object_tag_webview_uxss
- auxiliary/gather/android_stock_browser_uxss
- auxiliary/gather/apache_rave_creds
- auxiliary/gather/apache_superset_cookie_sig_priv_esc
- auxiliary/gather/apple_safari_ftp_url_cookie_theft
- auxiliary/gather/apple_safari_webarchive_uxss
- auxiliary/gather/asrep
- auxiliary/gather/asterisk_creds
- auxiliary/gather/avtech744_dvr_accounts
- auxiliary/gather/billquick_txtid_sqli
- auxiliary/gather/browser_info
- auxiliary/gather/browser_lanipleak
- auxiliary/gather/c2s_dvr_password_disclosure
- auxiliary/gather/censys_search
- auxiliary/gather/cerberus_helpdesk_hash_disclosure
- auxiliary/gather/checkpoint_gateway_fileread_cve_2024_24919
- auxiliary/gather/checkpoint_hostname
- auxiliary/gather/chrome_debugger
- auxiliary/gather/cisco_pvc2300_download_config
- auxiliary/gather/cisco_rv320_config
- auxiliary/gather/citrix_published_applications
- auxiliary/gather/citrix_published_bruteforce
- auxiliary/gather/cloud_lookup
- auxiliary/gather/coldfusion_pms_servlet_file_read
- auxiliary/gather/coldfusion_pwd_props
- auxiliary/gather/corpwatch_lookup_id
- auxiliary/gather/corpwatch_lookup_name
- auxiliary/gather/crushftp_fileread_cve_2024_4040
- auxiliary/gather/cve_2021_27850_apache_tapestry_hmac_key
- auxiliary/gather/d20pass
- auxiliary/gather/darkcomet_filedownloader
- auxiliary/gather/dolibarr_creds_sqli
- auxiliary/gather/doliwamp_traversal_creds
- auxiliary/gather/drupal_openid_xxe
- auxiliary/gather/eaton_nsm_creds
- auxiliary/gather/elasticsearch_enum
- auxiliary/gather/emc_cta_xxe
- auxiliary/gather/enum_dns
- auxiliary/gather/eventlog_cred_disclosure
- auxiliary/gather/exchange_proxylogon_collector
- auxiliary/gather/external_ip
- auxiliary/gather/f5_bigip_cookie_disclosure
- auxiliary/gather/firefox_pdfjs_file_theft
- auxiliary/gather/flash_rosetta_jsonp_url_disclosure
- auxiliary/gather/fortios_vpnssl_traversal_creds_leak
- auxiliary/gather/get_user_spns
- auxiliary/gather/gitlab_authenticated_subgroups_file_read
- auxiliary/gather/gitlab_tags_rss_feed_email_disclosure
- auxiliary/gather/grandstream_ucm62xx_sql_account_guess
- auxiliary/gather/hikvision_info_disclosure_cve_2017_7921
- auxiliary/gather/hp_enum_perfd
- auxiliary/gather/hp_snac_domain_creds
- auxiliary/gather/http_pdf_authors
- auxiliary/gather/huawei_wifi_info
- auxiliary/gather/ibm_bigfix_sites_packages_enum
- auxiliary/gather/ibm_sametime_enumerate_users
- auxiliary/gather/ibm_sametime_room_brute
- auxiliary/gather/ibm_sametime_version
- auxiliary/gather/ie_sandbox_findfiles
- auxiliary/gather/ie_uxss_injection
- auxiliary/gather/impersonate_ssl
- auxiliary/gather/ipcamera_password_disclosure
- auxiliary/gather/jasmin_ransomware_dir_traversal
- auxiliary/gather/jasmin_ransomware_sqli
- auxiliary/gather/java_rmi_registry
- auxiliary/gather/jenkins_cli_ampersand_arbitrary_file_read
- auxiliary/gather/jenkins_cred_recovery
- auxiliary/gather/jetty_web_inf_disclosure
- auxiliary/gather/joomla_com_realestatemanager_sqli
- auxiliary/gather/joomla_contenthistory_sqli
- auxiliary/gather/joomla_weblinks_sqli
- auxiliary/gather/kerberos_enumusers
- auxiliary/gather/konica_minolta_pwd_extract
- auxiliary/gather/lansweeper_collector
- auxiliary/gather/ldap_esc_vulnerable_cert_finder
- auxiliary/gather/ldap_hashdump
- auxiliary/gather/ldap_query
- auxiliary/gather/magento_xxe_cve_2024_34102
- auxiliary/gather/manageengine_adaudit_plus_xnode_enum
- auxiliary/gather/manageengine_datasecurity_plus_xnode_enum
- auxiliary/gather/mantisbt_admin_sqli
- auxiliary/gather/mcafee_epo_xxe
- auxiliary/gather/memcached_extractor
- auxiliary/gather/microweber_lfi
- auxiliary/gather/mikrotik_winbox_fileread
- auxiliary/gather/minio_bootstrap_verify_info_disc
- auxiliary/gather/mongodb_js_inject_collection_enum
- auxiliary/gather/mongodb_ops_manager_diagnostic_archive_info
- auxiliary/gather/ms14_052_xmldom
- auxiliary/gather/mybb_db_fingerprint
- auxiliary/gather/natpmp_external_address
- auxiliary/gather/netgear_password_disclosure
- auxiliary/gather/nis_bootparamd_domain
- auxiliary/gather/nis_ypserv_map
- auxiliary/gather/nuuo_cms_bruteforce
- auxiliary/gather/nuuo_cms_file_download
- auxiliary/gather/oats_downloadservlet_traversal
- auxiliary/gather/office365userenum
- auxiliary/gather/opennms_xxe
- auxiliary/gather/owncloud_phpinfo_reader
- auxiliary/gather/peplink_bauth_sqli
- auxiliary/gather/pimcore_creds_sqli
- auxiliary/gather/piwigo_cve_2023_26876
- auxiliary/gather/progress_moveit_sftp_fileread_cve_2024_5806
- auxiliary/gather/prometheus_api_gather
- auxiliary/gather/prometheus_node_exporter_gather
- auxiliary/gather/pulse_secure_file_disclosure
- auxiliary/gather/python_flask_cookie_signer
- auxiliary/gather/qnap_backtrace_admin_hash
- auxiliary/gather/qnap_lfi
- auxiliary/gather/rails_doubletap_file_read
- auxiliary/gather/rancher_authenticated_api_cred_exposure
- auxiliary/gather/ray_lfi_cve_2023_6020
- auxiliary/gather/redis_extractor
- auxiliary/gather/roundcube_auth_file_read
- auxiliary/gather/safari_file_url_navigation
- auxiliary/gather/saltstack_salt_root_key
- auxiliary/gather/samsung_browser_sop_bypass
- auxiliary/gather/search_email_collector
- auxiliary/gather/searchengine_subdomains_collector
- auxiliary/gather/shodan_honeyscore
- auxiliary/gather/shodan_host
- auxiliary/gather/shodan_search
- auxiliary/gather/snare_registry
- auxiliary/gather/solarwinds_orion_sqli
- auxiliary/gather/solarwinds_servu_fileread_cve_2024_28995
- auxiliary/gather/splunk_raw_server_info
- auxiliary/gather/ssllabs_scan
- auxiliary/gather/suite_crm_export_sqli
- auxiliary/gather/teamtalk_creds
- auxiliary/gather/tplink_archer_c7_traversal
- auxiliary/gather/trackit_sql_domain_creds
- auxiliary/gather/vbulletin_getindexablecontent_sqli
- auxiliary/gather/vbulletin_vote_sqli
- auxiliary/gather/vmware_vcenter_vmdir_ldap
- auxiliary/gather/windows_deployment_services_shares
- auxiliary/gather/windows_secrets_dump
- auxiliary/gather/wp_all_in_one_migration_export
- auxiliary/gather/wp_bookingpress_category_services_sqli
- auxiliary/gather/wp_ultimate_csv_importer_user_extract
- auxiliary/gather/wp_w3_total_cache_hash_extract
- auxiliary/gather/xbmc_traversal
- auxiliary/gather/xerox_pwd_extract
- auxiliary/gather/xerox_workcentre_5xxx_ldap
- auxiliary/gather/xymon_info
- auxiliary/gather/zabbix_toggleids_sqli
- auxiliary/gather/zookeeper_info_disclosure
- auxiliary/gather/zoomeye_search
- parser (1)
- pdf (1)
- scanner (632)
- acpp (1)
- afp (2)
- amqp (2)
- backdoor (1)
- chargen (1)
- couchdb (2)
- db2 (3)
- dcerpc (8)
- auxiliary/scanner/dcerpc/dfscoerce
- auxiliary/scanner/dcerpc/endpoint_mapper
- auxiliary/scanner/dcerpc/hidden
- auxiliary/scanner/dcerpc/management
- auxiliary/scanner/dcerpc/nrpc_enumusers
- auxiliary/scanner/dcerpc/petitpotam
- auxiliary/scanner/dcerpc/tcp_dcerpc_auditor
- auxiliary/scanner/dcerpc/windows_deployment_services
- dect (2)
- discovery (7)
- dlsw (1)
- dns (1)
- emc (2)
- etcd (2)
- finger (1)
- ftp (9)
- auxiliary/scanner/ftp/anonymous
- auxiliary/scanner/ftp/bison_ftp_traversal
- auxiliary/scanner/ftp/colorado_ftp_traversal
- auxiliary/scanner/ftp/easy_file_sharing_ftp
- auxiliary/scanner/ftp/ftp_login
- auxiliary/scanner/ftp/ftp_version
- auxiliary/scanner/ftp/konica_ftp_traversal
- auxiliary/scanner/ftp/pcman_ftp_traversal
- auxiliary/scanner/ftp/titanftp_xcrc_traversal
- gopher (1)
- gprs (1)
- h323 (1)
- http (297)
- auxiliary/scanner/http/a10networks_ax_directory_traversal
- auxiliary/scanner/http/accellion_fta_statecode_file_read
- auxiliary/scanner/http/adobe_xml_inject
- auxiliary/scanner/http/advantech_webaccess_login
- auxiliary/scanner/http/allegro_rompager_misfortune_cookie
- auxiliary/scanner/http/apache_activemq_source_disclosure
- auxiliary/scanner/http/apache_activemq_traversal
- auxiliary/scanner/http/apache_flink_jobmanager_traversal
- auxiliary/scanner/http/apache_mod_cgi_bash_env
- auxiliary/scanner/http/apache_nifi_login
- auxiliary/scanner/http/apache_nifi_version
- auxiliary/scanner/http/apache_normalize_path
- auxiliary/scanner/http/apache_optionsbleed
- auxiliary/scanner/http/apache_userdir_enum
- auxiliary/scanner/http/appletv_login
- auxiliary/scanner/http/atlassian_crowd_fileaccess
- auxiliary/scanner/http/axis_local_file_include
- auxiliary/scanner/http/axis_login
- auxiliary/scanner/http/azure_ad_login
- auxiliary/scanner/http/backup_file
- auxiliary/scanner/http/barracuda_directory_traversal
- auxiliary/scanner/http/bavision_cam_login
- auxiliary/scanner/http/binom3_login_config_pass_dump
- auxiliary/scanner/http/bitweaver_overlay_type_traversal
- auxiliary/scanner/http/blind_sql_query
- auxiliary/scanner/http/bmc_trackit_passwd_reset
- auxiliary/scanner/http/brute_dirs
- auxiliary/scanner/http/buffalo_login
- auxiliary/scanner/http/buildmaster_login
- auxiliary/scanner/http/caidao_bruteforce_login
- auxiliary/scanner/http/canon_wireless
- auxiliary/scanner/http/cassandra_web_file_read
- auxiliary/scanner/http/cert
- auxiliary/scanner/http/cgit_traversal
- auxiliary/scanner/http/chef_webui_login
- auxiliary/scanner/http/chromecast_webserver
- auxiliary/scanner/http/chromecast_wifi
- auxiliary/scanner/http/cisco_asa_asdm_bruteforce
- auxiliary/scanner/http/cisco_asa_clientless_vpn
- auxiliary/scanner/http/cisco_device_manager
- auxiliary/scanner/http/cisco_directory_traversal
- auxiliary/scanner/http/cisco_firepower_download
- auxiliary/scanner/http/cisco_firepower_login
- auxiliary/scanner/http/cisco_ios_auth_bypass
- auxiliary/scanner/http/cisco_ironport_enum
- auxiliary/scanner/http/cisco_nac_manager_traversal
- auxiliary/scanner/http/cisco_ssl_vpn
- auxiliary/scanner/http/cisco_ssl_vpn_priv_esc
- auxiliary/scanner/http/citrix_bleed_cve_2023_4966
- auxiliary/scanner/http/citrix_dir_traversal
- auxiliary/scanner/http/clansphere_traversal
- auxiliary/scanner/http/cnpilot_r_web_login_loot
- auxiliary/scanner/http/coldfusion_locale_traversal
- auxiliary/scanner/http/coldfusion_version
- auxiliary/scanner/http/concrete5_member_list
- auxiliary/scanner/http/copy_of_file
- auxiliary/scanner/http/crawler
- auxiliary/scanner/http/dell_idrac
- auxiliary/scanner/http/dicoogle_traversal
- auxiliary/scanner/http/dir_listing
- auxiliary/scanner/http/dir_scanner
- auxiliary/scanner/http/dir_webdav_unicode_bypass
- auxiliary/scanner/http/directadmin_login
- auxiliary/scanner/http/dlink_dir_300_615_http_login
- auxiliary/scanner/http/dlink_dir_615h_http_login
- auxiliary/scanner/http/dlink_dir_session_cgi_http_login
- auxiliary/scanner/http/dlink_user_agent_backdoor
- auxiliary/scanner/http/dnalims_file_retrieve
- auxiliary/scanner/http/docker_version
- auxiliary/scanner/http/dolibarr_16_contact_dump
- auxiliary/scanner/http/dolibarr_login
- auxiliary/scanner/http/drupal_views_user_enum
- auxiliary/scanner/http/ektron_cms400net
- auxiliary/scanner/http/elasticsearch_memory_disclosure
- auxiliary/scanner/http/elasticsearch_traversal
- auxiliary/scanner/http/emby_ssrf_scanner
- auxiliary/scanner/http/emby_version_ssrf
- auxiliary/scanner/http/enum_wayback
- auxiliary/scanner/http/epmp1000_dump_config
- auxiliary/scanner/http/epmp1000_dump_hashes
- auxiliary/scanner/http/epmp1000_get_chart_cmd_exec
- auxiliary/scanner/http/epmp1000_ping_cmd_exec
- auxiliary/scanner/http/epmp1000_reset_pass
- auxiliary/scanner/http/epmp1000_web_login
- auxiliary/scanner/http/error_sql_injection
- auxiliary/scanner/http/es_file_explorer_open_port
- auxiliary/scanner/http/etherpad_duo_login
- auxiliary/scanner/http/exchange_proxylogon
- auxiliary/scanner/http/exchange_web_server_pushsubscription
- auxiliary/scanner/http/f5_bigip_virtual_server
- auxiliary/scanner/http/f5_mgmt_scanner
- auxiliary/scanner/http/file_same_name_dir
- auxiliary/scanner/http/files_dir
- auxiliary/scanner/http/fortimail_login_bypass_detection
- auxiliary/scanner/http/fortinet_ssl_vpn
- auxiliary/scanner/http/frontpage_credential_dump
- auxiliary/scanner/http/frontpage_login
- auxiliary/scanner/http/gavazzi_em_login_loot
- auxiliary/scanner/http/git_scanner
- auxiliary/scanner/http/gitlab_graphql_user_enum
- auxiliary/scanner/http/gitlab_login
- auxiliary/scanner/http/gitlab_user_enum
- auxiliary/scanner/http/gitlab_version
- auxiliary/scanner/http/glassfish_login
- auxiliary/scanner/http/glassfish_traversal
- auxiliary/scanner/http/goahead_traversal
- auxiliary/scanner/http/grafana_plugin_traversal
- auxiliary/scanner/http/groupwise_agents_http_traversal
- auxiliary/scanner/http/host_header_injection
- auxiliary/scanner/http/hp_imc_bims_downloadservlet_traversal
- auxiliary/scanner/http/hp_imc_faultdownloadservlet_traversal
- auxiliary/scanner/http/hp_imc_ictdownloadservlet_traversal
- auxiliary/scanner/http/hp_imc_reportimgservlt_traversal
- auxiliary/scanner/http/hp_imc_som_file_download
- auxiliary/scanner/http/hp_sitescope_getfileinternal_fileaccess
- auxiliary/scanner/http/hp_sitescope_getsitescopeconfiguration
- auxiliary/scanner/http/hp_sitescope_loadfilecontent_fileaccess
- auxiliary/scanner/http/hp_sys_mgmt_login
- auxiliary/scanner/http/http_header
- auxiliary/scanner/http/http_hsts
- auxiliary/scanner/http/http_login
- auxiliary/scanner/http/http_put
- auxiliary/scanner/http/http_sickrage_password_leak
- auxiliary/scanner/http/http_traversal
- auxiliary/scanner/http/http_version
- auxiliary/scanner/http/httpbl_lookup
- auxiliary/scanner/http/httpdasm_directory_traversal
- auxiliary/scanner/http/icinga_static_library_file_directory_traversal
- auxiliary/scanner/http/iis_internal_ip
- auxiliary/scanner/http/iis_shortname_scanner
- auxiliary/scanner/http/influxdb_enum
- auxiliary/scanner/http/infovista_enum
- auxiliary/scanner/http/intel_amt_digest_bypass
- auxiliary/scanner/http/ipboard_login
- auxiliary/scanner/http/jboss_status
- auxiliary/scanner/http/jboss_vulnscan
- auxiliary/scanner/http/jenkins_command
- auxiliary/scanner/http/jenkins_enum
- auxiliary/scanner/http/jenkins_login
- auxiliary/scanner/http/jira_user_enum
- auxiliary/scanner/http/joomla_api_improper_access_checks
- auxiliary/scanner/http/joomla_bruteforce_login
- auxiliary/scanner/http/joomla_ecommercewd_sqli_scanner
- auxiliary/scanner/http/joomla_gallerywd_sqli_scanner
- auxiliary/scanner/http/joomla_pages
- auxiliary/scanner/http/joomla_plugins
- auxiliary/scanner/http/joomla_version
- auxiliary/scanner/http/jupyter_login
- auxiliary/scanner/http/kodi_traversal
- auxiliary/scanner/http/limesurvey_zip_traversals
- auxiliary/scanner/http/linknat_vos_traversal
- auxiliary/scanner/http/linksys_e1500_traversal
- auxiliary/scanner/http/litespeed_source_disclosure
- auxiliary/scanner/http/log4shell_scanner
- auxiliary/scanner/http/lucky_punch
- auxiliary/scanner/http/majordomo2_directory_traversal
- auxiliary/scanner/http/manageengine_desktop_central_login
- auxiliary/scanner/http/manageengine_deviceexpert_traversal
- auxiliary/scanner/http/manageengine_deviceexpert_user_creds
- auxiliary/scanner/http/manageengine_securitymanager_traversal
- auxiliary/scanner/http/mediawiki_svg_fileaccess
- auxiliary/scanner/http/meteocontrol_weblog_extractadmin
- auxiliary/scanner/http/mod_negotiation_brute
- auxiliary/scanner/http/mod_negotiation_scanner
- auxiliary/scanner/http/ms09_020_webdav_unicode_bypass
- auxiliary/scanner/http/ms15_034_http_sys_memory_dump
- auxiliary/scanner/http/mybook_live_login
- auxiliary/scanner/http/nagios_xi_scanner
- auxiliary/scanner/http/netdecision_traversal
- auxiliary/scanner/http/netgear_sph200d_traversal
- auxiliary/scanner/http/nginx_source_disclosure
- auxiliary/scanner/http/novell_file_reporter_fsfui_fileaccess
- auxiliary/scanner/http/novell_file_reporter_srs_fileaccess
- auxiliary/scanner/http/novell_mdm_creds
- auxiliary/scanner/http/ntlm_info_enumeration
- auxiliary/scanner/http/octopusdeploy_login
- auxiliary/scanner/http/onion_omega2_login
- auxiliary/scanner/http/open_proxy
- auxiliary/scanner/http/openmind_messageos_login
- auxiliary/scanner/http/options
- auxiliary/scanner/http/oracle_demantra_database_credentials_leak
- auxiliary/scanner/http/oracle_demantra_file_retrieval
- auxiliary/scanner/http/oracle_ilom_login
- auxiliary/scanner/http/owa_ews_login
- auxiliary/scanner/http/owa_iis_internal_ip
- auxiliary/scanner/http/owa_login
- auxiliary/scanner/http/phpmyadmin_login
- auxiliary/scanner/http/pocketpad_login
- auxiliary/scanner/http/prev_dir_same_name_file
- auxiliary/scanner/http/radware_appdirector_enum
- auxiliary/scanner/http/rails_json_yaml_scanner
- auxiliary/scanner/http/rails_mass_assignment
- auxiliary/scanner/http/rails_xml_yaml_scanner
- auxiliary/scanner/http/rdp_web_login
- auxiliary/scanner/http/replace_ext
- auxiliary/scanner/http/rewrite_proxy_bypass
- auxiliary/scanner/http/rfcode_reader_enum
- auxiliary/scanner/http/rips_traversal
- auxiliary/scanner/http/riverbed_steelhead_vcx_file_read
- auxiliary/scanner/http/robots_txt
- auxiliary/scanner/http/rpyc_rce
- auxiliary/scanner/http/s40_traversal
- auxiliary/scanner/http/sap_businessobjects_user_brute
- auxiliary/scanner/http/sap_businessobjects_user_brute_web
- auxiliary/scanner/http/sap_businessobjects_user_enum
- auxiliary/scanner/http/sap_businessobjects_version_enum
- auxiliary/scanner/http/scraper
- auxiliary/scanner/http/sentry_cdu_enum
- auxiliary/scanner/http/servicedesk_plus_traversal
- auxiliary/scanner/http/sevone_enum
- auxiliary/scanner/http/simple_webserver_traversal
- auxiliary/scanner/http/smt_ipmi_49152_exposure
- auxiliary/scanner/http/smt_ipmi_cgi_scanner
- auxiliary/scanner/http/smt_ipmi_static_cert_scanner
- auxiliary/scanner/http/smt_ipmi_url_redirect_traversal
- auxiliary/scanner/http/soap_xml
- auxiliary/scanner/http/sockso_traversal
- auxiliary/scanner/http/softing_sis_login
- auxiliary/scanner/http/splunk_web_login
- auxiliary/scanner/http/springcloud_directory_traversal
- auxiliary/scanner/http/springcloud_traversal
- auxiliary/scanner/http/squid_pivot_scanning
- auxiliary/scanner/http/squiz_matrix_user_enum
- auxiliary/scanner/http/support_center_plus_directory_traversal
- auxiliary/scanner/http/surgenews_user_creds
- auxiliary/scanner/http/svn_scanner
- auxiliary/scanner/http/svn_wcdb_scanner
- auxiliary/scanner/http/sybase_easerver_traversal
- auxiliary/scanner/http/symantec_brightmail_ldapcreds
- auxiliary/scanner/http/symantec_brightmail_logfile
- auxiliary/scanner/http/symantec_web_gateway_login
- auxiliary/scanner/http/syncovery_linux_login
- auxiliary/scanner/http/syncovery_linux_token_cve_2022_36536
- auxiliary/scanner/http/synology_forget_passwd_user_enum
- auxiliary/scanner/http/telerik_report_server_auth_bypass
- auxiliary/scanner/http/thinvnc_traversal
- auxiliary/scanner/http/titan_ftp_admin_pwd
- auxiliary/scanner/http/title
- auxiliary/scanner/http/tomcat_enum
- auxiliary/scanner/http/tomcat_mgr_login
- auxiliary/scanner/http/totaljs_traversal
- auxiliary/scanner/http/tplink_traversal_noauth
- auxiliary/scanner/http/trace
- auxiliary/scanner/http/trace_axd
- auxiliary/scanner/http/tvt_nvms_traversal
- auxiliary/scanner/http/typo3_bruteforce
- auxiliary/scanner/http/vcms_login
- auxiliary/scanner/http/verb_auth_bypass
- auxiliary/scanner/http/vhost_scanner
- auxiliary/scanner/http/vicidial_multiple_sqli
- auxiliary/scanner/http/vicidial_sql_enum_users_pass
- auxiliary/scanner/http/wangkongbao_traversal
- auxiliary/scanner/http/web_vulndb
- auxiliary/scanner/http/webdav_internal_ip
- auxiliary/scanner/http/webdav_scanner
- auxiliary/scanner/http/webdav_website_content
- auxiliary/scanner/http/webpagetest_traversal
- auxiliary/scanner/http/wildfly_traversal
- auxiliary/scanner/http/wordpress_content_injection
- auxiliary/scanner/http/wordpress_cp_calendar_sqli
- auxiliary/scanner/http/wordpress_ghost_scanner
- auxiliary/scanner/http/wordpress_login_enum
- auxiliary/scanner/http/wordpress_multicall_creds
- auxiliary/scanner/http/wordpress_pingback_access
- auxiliary/scanner/http/wordpress_scanner
- auxiliary/scanner/http/wordpress_xmlrpc_login
- auxiliary/scanner/http/wowza_streaming_engine_manager_login
- auxiliary/scanner/http/wp_abandoned_cart_sqli
- auxiliary/scanner/http/wp_arbitrary_file_deletion
- auxiliary/scanner/http/wp_bulletproofsecurity_backups
- auxiliary/scanner/http/wp_chopslider_id_sqli
- auxiliary/scanner/http/wp_contus_video_gallery_sqli
- auxiliary/scanner/http/wp_dukapress_file_read
- auxiliary/scanner/http/wp_duplicator_file_read
- auxiliary/scanner/http/wp_easy_wp_smtp
- auxiliary/scanner/http/wp_email_sub_news_sqli
- auxiliary/scanner/http/wp_gimedia_library_file_read
- auxiliary/scanner/http/wp_learnpress_sqli
- auxiliary/scanner/http/wp_loginizer_log_sqli
- auxiliary/scanner/http/wp_mobile_pack_info_disclosure
- auxiliary/scanner/http/wp_mobileedition_file_read
- auxiliary/scanner/http/wp_modern_events_calendar_sqli
- auxiliary/scanner/http/wp_nextgen_galley_file_read
- auxiliary/scanner/http/wp_paid_membership_pro_code_sqli
- auxiliary/scanner/http/wp_registrationmagic_sqli
- auxiliary/scanner/http/wp_secure_copy_content_protection_sqli
- auxiliary/scanner/http/wp_simple_backup_file_read
- auxiliary/scanner/http/wp_subscribe_comments_file_read
- auxiliary/scanner/http/wp_total_upkeep_downloader
- auxiliary/scanner/http/wp_woocommerce_payments_add_user
- auxiliary/scanner/http/wp_wps_hide_login_revealer
- auxiliary/scanner/http/xpath
- auxiliary/scanner/http/yaws_traversal
- auxiliary/scanner/http/zabbix_login
- auxiliary/scanner/http/zenload_balancer_traversal
- auxiliary/scanner/http/zenworks_assetmanagement_fileaccess
- auxiliary/scanner/http/zenworks_assetmanagement_getconfig
- ike (1)
- imap (1)
- ip (1)
- ipmi (3)
- jenkins (1)
- kademlia (1)
- kerberos (1)
- ldap (1)
- llmnr (1)
- lotus (3)
- mdns (1)
- memcached (2)
- misc (22)
- auxiliary/scanner/misc/cctv_dvr_login
- auxiliary/scanner/misc/cisco_smart_install
- auxiliary/scanner/misc/clamav_control
- auxiliary/scanner/misc/cups_browsed_info_disclosure
- auxiliary/scanner/misc/dahua_dvr_auth_bypass
- auxiliary/scanner/misc/dvr_config_disclosure
- auxiliary/scanner/misc/easycafe_server_fileaccess
- auxiliary/scanner/misc/freeswitch_event_socket_login
- auxiliary/scanner/misc/ib_service_mgr_info
- auxiliary/scanner/misc/ibm_mq_channel_brute
- auxiliary/scanner/misc/ibm_mq_enum
- auxiliary/scanner/misc/ibm_mq_login
- auxiliary/scanner/misc/java_jmx_server
- auxiliary/scanner/misc/java_rmi_server
- auxiliary/scanner/misc/oki_scanner
- auxiliary/scanner/misc/poisonivy_control_scanner
- auxiliary/scanner/misc/raysharp_dvr_passwords
- auxiliary/scanner/misc/rocketmq_version
- auxiliary/scanner/misc/rosewill_rxs3211_passwords
- auxiliary/scanner/misc/sercomm_backdoor_scanner
- auxiliary/scanner/misc/sunrpc_portmapper
- auxiliary/scanner/misc/zenworks_preboot_fileaccess
- mongodb (1)
- motorola (1)
- mqtt (1)
- msf (2)
- msmail (3)
- msmq (1)
- mssql (5)
- mysql (7)
- natpmp (1)
- nessus (4)
- netbios (1)
- nexpose (1)
- nfs (1)
- nntp (1)
- ntp (8)
- auxiliary/scanner/ntp/ntp_monlist
- auxiliary/scanner/ntp/ntp_nak_to_the_future
- auxiliary/scanner/ntp/ntp_peer_list_dos
- auxiliary/scanner/ntp/ntp_peer_list_sum_dos
- auxiliary/scanner/ntp/ntp_readvar
- auxiliary/scanner/ntp/ntp_req_nonce_dos
- auxiliary/scanner/ntp/ntp_reslist_dos
- auxiliary/scanner/ntp/ntp_unsettrap_dos
- openvas (3)
- oracle (12)
- auxiliary/scanner/oracle/emc_sid
- auxiliary/scanner/oracle/isqlplus_login
- auxiliary/scanner/oracle/isqlplus_sidbrute
- auxiliary/scanner/oracle/oracle_hashdump
- auxiliary/scanner/oracle/oracle_login
- auxiliary/scanner/oracle/sid_brute
- auxiliary/scanner/oracle/sid_enum
- auxiliary/scanner/oracle/spy_sid
- auxiliary/scanner/oracle/tnslsnr_version
- auxiliary/scanner/oracle/tnspoison_checker
- auxiliary/scanner/oracle/xdb_sid
- auxiliary/scanner/oracle/xdb_sid_brute
- pcanywhere (3)
- pop3 (2)
- portmap (1)
- portscan (5)
- postgres (5)
- printer (9)
- auxiliary/scanner/printer/canon_iradv_pwd_extract
- auxiliary/scanner/printer/printer_delete_file
- auxiliary/scanner/printer/printer_download_file
- auxiliary/scanner/printer/printer_env_vars
- auxiliary/scanner/printer/printer_list_dir
- auxiliary/scanner/printer/printer_list_volumes
- auxiliary/scanner/printer/printer_ready_message
- auxiliary/scanner/printer/printer_upload_file
- auxiliary/scanner/printer/printer_version_info
- quake (1)
- rdp (3)
- redis (3)
- rogue (2)
- rservices (3)
- rsync (1)
- sage (1)
- sap (36)
- auxiliary/scanner/sap/sap_ctc_verb_tampering_user_mgmt
- auxiliary/scanner/sap/sap_hostctrl_getcomputersystem
- auxiliary/scanner/sap/sap_icf_public_info
- auxiliary/scanner/sap/sap_icm_urlscan
- auxiliary/scanner/sap/sap_mgmt_con_abaplog
- auxiliary/scanner/sap/sap_mgmt_con_brute_login
- auxiliary/scanner/sap/sap_mgmt_con_extractusers
- auxiliary/scanner/sap/sap_mgmt_con_getaccesspoints
- auxiliary/scanner/sap/sap_mgmt_con_getenv
- auxiliary/scanner/sap/sap_mgmt_con_getlogfiles
- auxiliary/scanner/sap/sap_mgmt_con_getprocesslist
- auxiliary/scanner/sap/sap_mgmt_con_getprocessparameter
- auxiliary/scanner/sap/sap_mgmt_con_instanceproperties
- auxiliary/scanner/sap/sap_mgmt_con_listconfigfiles
- auxiliary/scanner/sap/sap_mgmt_con_listlogfiles
- auxiliary/scanner/sap/sap_mgmt_con_startprofile
- auxiliary/scanner/sap/sap_mgmt_con_version
- auxiliary/scanner/sap/sap_router_info_request
- auxiliary/scanner/sap/sap_router_portscanner
- auxiliary/scanner/sap/sap_service_discovery
- auxiliary/scanner/sap/sap_smb_relay
- auxiliary/scanner/sap/sap_soap_bapi_user_create1
- auxiliary/scanner/sap/sap_soap_rfc_brute_login
- auxiliary/scanner/sap/sap_soap_rfc_dbmcli_sxpg_call_system_command_exec
- auxiliary/scanner/sap/sap_soap_rfc_dbmcli_sxpg_command_exec
- auxiliary/scanner/sap/sap_soap_rfc_eps_get_directory_listing
- auxiliary/scanner/sap/sap_soap_rfc_pfl_check_os_file_existence
- auxiliary/scanner/sap/sap_soap_rfc_ping
- auxiliary/scanner/sap/sap_soap_rfc_read_table
- auxiliary/scanner/sap/sap_soap_rfc_rzl_read_dir
- auxiliary/scanner/sap/sap_soap_rfc_susr_rfc_user_interface
- auxiliary/scanner/sap/sap_soap_rfc_sxpg_call_system_exec
- auxiliary/scanner/sap/sap_soap_rfc_sxpg_command_exec
- auxiliary/scanner/sap/sap_soap_rfc_system_info
- auxiliary/scanner/sap/sap_soap_th_saprel_disclosure
- auxiliary/scanner/sap/sap_web_gui_brute_login
- scada (15)
- auxiliary/scanner/scada/bacnet_l3
- auxiliary/scanner/scada/digi_addp_reboot
- auxiliary/scanner/scada/digi_addp_version
- auxiliary/scanner/scada/digi_realport_serialport_scan
- auxiliary/scanner/scada/digi_realport_version
- auxiliary/scanner/scada/indusoft_ntwebserver_fileaccess
- auxiliary/scanner/scada/koyo_login
- auxiliary/scanner/scada/modbus_banner_grabbing
- auxiliary/scanner/scada/modbus_findunitid
- auxiliary/scanner/scada/modbusclient
- auxiliary/scanner/scada/modbusdetect
- auxiliary/scanner/scada/moxa_discover
- auxiliary/scanner/scada/pcomclient
- auxiliary/scanner/scada/profinet_siemens
- auxiliary/scanner/scada/sielco_winlog_fileaccess
- sip (5)
- smb (15)
- impacket (3)
- auxiliary/scanner/smb/pipe_auditor
- auxiliary/scanner/smb/pipe_dcerpc_auditor
- auxiliary/scanner/smb/psexec_loggedin_users
- auxiliary/scanner/smb/smb_enum_gpp
- auxiliary/scanner/smb/smb_enumshares
- auxiliary/scanner/smb/smb_enumusers
- auxiliary/scanner/smb/smb_enumusers_domain
- auxiliary/scanner/smb/smb_login
- auxiliary/scanner/smb/smb_lookupsid
- auxiliary/scanner/smb/smb_ms17_010
- auxiliary/scanner/smb/smb_uninit_cred
- auxiliary/scanner/smb/smb_version
- smtp (4)
- snmp (17)
- auxiliary/scanner/snmp/aix_version
- auxiliary/scanner/snmp/arris_dg950
- auxiliary/scanner/snmp/brocade_enumhash
- auxiliary/scanner/snmp/cisco_config_tftp
- auxiliary/scanner/snmp/cisco_upload_file
- auxiliary/scanner/snmp/cnpilot_r_snmp_loot
- auxiliary/scanner/snmp/epmp1000_snmp_loot
- auxiliary/scanner/snmp/netopia_enum
- auxiliary/scanner/snmp/sbg6580_enum
- auxiliary/scanner/snmp/snmp_enum
- auxiliary/scanner/snmp/snmp_enum_hp_laserjet
- auxiliary/scanner/snmp/snmp_enumshares
- auxiliary/scanner/snmp/snmp_enumusers
- auxiliary/scanner/snmp/snmp_login
- auxiliary/scanner/snmp/snmp_set
- auxiliary/scanner/snmp/ubee_ddw3611
- auxiliary/scanner/snmp/xerox_workcentre_enumusers
- ssh (14)
- auxiliary/scanner/ssh/apache_karaf_command_execution
- auxiliary/scanner/ssh/cerberus_sftp_enumusers
- auxiliary/scanner/ssh/detect_kippo
- auxiliary/scanner/ssh/eaton_xpert_backdoor
- auxiliary/scanner/ssh/fortinet_backdoor
- auxiliary/scanner/ssh/juniper_backdoor
- auxiliary/scanner/ssh/karaf_login
- auxiliary/scanner/ssh/libssh_auth_bypass
- auxiliary/scanner/ssh/ssh_enum_git_keys
- auxiliary/scanner/ssh/ssh_enumusers
- auxiliary/scanner/ssh/ssh_identify_pubkeys
- auxiliary/scanner/ssh/ssh_login
- auxiliary/scanner/ssh/ssh_login_pubkey
- auxiliary/scanner/ssh/ssh_version
- ssl (4)
- steam (1)
- telephony (1)
- telnet (8)
- auxiliary/scanner/telnet/brocade_enable_login
- auxiliary/scanner/telnet/lantronix_telnet_password
- auxiliary/scanner/telnet/lantronix_telnet_version
- auxiliary/scanner/telnet/satel_cmd_exec
- auxiliary/scanner/telnet/telnet_encrypt_overflow
- auxiliary/scanner/telnet/telnet_login
- auxiliary/scanner/telnet/telnet_ruggedcom
- auxiliary/scanner/telnet/telnet_version
- teradata (1)
- tftp (3)
- ubiquiti (1)
- udp (1)
- upnp (2)
- varnish (2)
- vmware (12)
- auxiliary/scanner/vmware/esx_fingerprint
- auxiliary/scanner/vmware/vmauthd_login
- auxiliary/scanner/vmware/vmauthd_version
- auxiliary/scanner/vmware/vmware_enum_permissions
- auxiliary/scanner/vmware/vmware_enum_sessions
- auxiliary/scanner/vmware/vmware_enum_users
- auxiliary/scanner/vmware/vmware_enum_vms
- auxiliary/scanner/vmware/vmware_host_details
- auxiliary/scanner/vmware/vmware_http_login
- auxiliary/scanner/vmware/vmware_screenshot_stealer
- auxiliary/scanner/vmware/vmware_server_dir_trav
- auxiliary/scanner/vmware/vmware_update_manager_traversal
- vnc (3)
- voice (1)
- vxworks (3)
- winrm (4)
- wproxy (1)
- wsdd (1)
- x11 (1)
- server (46)
- capture (18)
- auxiliary/server/capture/drda
- auxiliary/server/capture/ftp
- auxiliary/server/capture/http
- auxiliary/server/capture/http_basic
- auxiliary/server/capture/http_javascript_keylogger
- auxiliary/server/capture/http_ntlm
- auxiliary/server/capture/imap
- auxiliary/server/capture/ldap
- auxiliary/server/capture/mssql
- auxiliary/server/capture/mysql
- auxiliary/server/capture/pop3
- auxiliary/server/capture/postgresql
- auxiliary/server/capture/printjob_capture
- auxiliary/server/capture/sip
- auxiliary/server/capture/smb
- auxiliary/server/capture/smtp
- auxiliary/server/capture/telnet
- auxiliary/server/capture/vnc
- dns (2)
- auxiliary/server/android_browsable_msf_launch
- auxiliary/server/android_mercury_parseuri
- auxiliary/server/browser_autopwn
- auxiliary/server/browser_autopwn2
- auxiliary/server/dhclient_bash_env
- auxiliary/server/dhcp
- auxiliary/server/fakedns
- auxiliary/server/ftp
- auxiliary/server/http_ntlmrelay
- auxiliary/server/icmp_exfil
- auxiliary/server/jsse_skiptls_mitm_proxy
- auxiliary/server/ldap
- auxiliary/server/local_hwbridge
- auxiliary/server/ms15_134_mcl_leak
- auxiliary/server/netbios_spoof_nat
- auxiliary/server/openssl_altchainsforgery_mitm_proxy
- auxiliary/server/openssl_heartbeat_client_memory
- auxiliary/server/pxeexploit
- auxiliary/server/regsvr32_command_delivery_server
- auxiliary/server/socks_proxy
- auxiliary/server/socks_unc
- auxiliary/server/teamviewer_uri_smb_redirect
- auxiliary/server/tftp
- auxiliary/server/webkit_xslt_dropper
- auxiliary/server/wget_symlink_file_write
- auxiliary/server/wpad
- sniffer (1)
- spoof (11)
- sqli (19)
- dlink (1)
- openemr (1)
- oracle (17)
- auxiliary/sqli/oracle/dbms_cdc_ipublish
- auxiliary/sqli/oracle/dbms_cdc_publish
- auxiliary/sqli/oracle/dbms_cdc_publish2
- auxiliary/sqli/oracle/dbms_cdc_publish3
- auxiliary/sqli/oracle/dbms_cdc_subscribe_activate_subscription
- auxiliary/sqli/oracle/dbms_export_extension
- auxiliary/sqli/oracle/dbms_metadata_get_granted_xml
- auxiliary/sqli/oracle/dbms_metadata_get_xml
- auxiliary/sqli/oracle/dbms_metadata_open
- auxiliary/sqli/oracle/droptable_trigger
- auxiliary/sqli/oracle/jvm_os_code_10g
- auxiliary/sqli/oracle/jvm_os_code_11g
- auxiliary/sqli/oracle/lt_compressworkspace
- auxiliary/sqli/oracle/lt_findricset_cursor
- auxiliary/sqli/oracle/lt_mergeworkspace
- auxiliary/sqli/oracle/lt_removeworkspace
- auxiliary/sqli/oracle/lt_rollbackworkspace
- voip (6)
- vsploit (5)
- encoder (49)
- cmd (8)
- generic (2)
- mipsbe (2)
- mipsle (2)
- php (3)
- ppc (2)
- ruby (1)
- sparc (1)
- x64 (4)
- x86 (24)
- encoder/x86/add_sub
- encoder/x86/alpha_mixed
- encoder/x86/alpha_upper
- encoder/x86/avoid_underscore_tolower
- encoder/x86/avoid_utf8_tolower
- encoder/x86/bloxor
- encoder/x86/bmp_polyglot
- encoder/x86/call4_dword_xor
- encoder/x86/context_cpuid
- encoder/x86/context_stat
- encoder/x86/context_time
- encoder/x86/countdown
- encoder/x86/fnstenv_mov
- encoder/x86/jmp_call_additive
- encoder/x86/nonalpha
- encoder/x86/nonupper
- encoder/x86/opt_sub
- encoder/x86/service
- encoder/x86/shikata_ga_nai
- encoder/x86/single_static_bit
- encoder/x86/unicode_mixed
- encoder/x86/unicode_upper
- encoder/x86/xor_dynamic
- encoder/x86/xor_poly
- evasion (9)
- windows (9)
- evasion/windows/applocker_evasion_install_util
- evasion/windows/applocker_evasion_msbuild
- evasion/windows/applocker_evasion_presentationhost
- evasion/windows/applocker_evasion_regasm_regsvcs
- evasion/windows/applocker_evasion_workflow_compiler
- evasion/windows/process_herpaderping
- evasion/windows/syscall_inject
- evasion/windows/windows_defender_exe
- evasion/windows/windows_defender_js_hta
- exploit (2458)
- aix (5)
- android (10)
- apple_ios (6)
- bsd (1)
- bsdi (1)
- dialup (1)
- firefox (1)
- freebsd (15)
- hpux (1)
- irix (1)
- linux (485)
- antivirus (1)
- browser (1)
- fileformat (1)
- ftp (2)
- games (1)
- http (303)
- exploit/linux/http/accellion_fta_getstatus_oauth
- exploit/linux/http/acronis_cyber_infra_cve_2023_45249
- exploit/linux/http/advantech_switch_bash_env_exec
- exploit/linux/http/airties_login_cgi_bof
- exploit/linux/http/alcatel_omnipcx_mastercgi_exec
- exploit/linux/http/alienvault_exec
- exploit/linux/http/alienvault_sqli_exec
- exploit/linux/http/apache_airflow_dag_rce
- exploit/linux/http/apache_continuum_cmd_exec
- exploit/linux/http/apache_couchdb_cmd_exec
- exploit/linux/http/apache_druid_js_rce
- exploit/linux/http/apache_hugegraph_gremlin_rce
- exploit/linux/http/apache_nifi_h2_rce
- exploit/linux/http/apache_ofbiz_deserialization
- exploit/linux/http/apache_ofbiz_deserialization_soap
- exploit/linux/http/apache_solr_backup_restore
- exploit/linux/http/apache_spark_rce_cve_2022_33891
- exploit/linux/http/apache_superset_cookie_sig_rce
- exploit/linux/http/artica_proxy_auth_bypass_service_cmds_peform_command_injection
- exploit/linux/http/artica_proxy_unauth_rce_cve_2024_2054
- exploit/linux/http/astium_sqli_upload
- exploit/linux/http/asuswrt_lan_rce
- exploit/linux/http/atutor_filemanager_traversal
- exploit/linux/http/axis_app_install
- exploit/linux/http/axis_srv_parhand_rce
- exploit/linux/http/belkin_login_bof
- exploit/linux/http/bitbucket_git_cmd_injection
- exploit/linux/http/bludit_upload_images_exec
- exploit/linux/http/cacti_unauthenticated_cmd_injection
- exploit/linux/http/cayin_cms_ntp
- exploit/linux/http/centreon_pollers_auth_rce
- exploit/linux/http/centreon_sqli_exec
- exploit/linux/http/centreon_useralias_exec
- exploit/linux/http/cfme_manageiq_evm_upload_exec
- exploit/linux/http/chamilo_unauth_rce_cve_2023_34960
- exploit/linux/http/chaos_rat_xss_to_rce
- exploit/linux/http/cisco_asax_sfr_rce
- exploit/linux/http/cisco_firepower_useradd
- exploit/linux/http/cisco_hyperflex_file_upload_rce
- exploit/linux/http/cisco_hyperflex_hx_data_platform_cmd_exec
- exploit/linux/http/cisco_prime_inf_rce
- exploit/linux/http/cisco_rv32x_rce
- exploit/linux/http/cisco_rv340_lan
- exploit/linux/http/cisco_rv_series_authbypass_and_rce
- exploit/linux/http/cisco_ucs_cloupia_script_rce
- exploit/linux/http/cisco_ucs_rce
- exploit/linux/http/control_web_panel_login_cmd_exec
- exploit/linux/http/cpi_tararchive_upload
- exploit/linux/http/craftcms_unauth_rce_cve_2023_41892
- exploit/linux/http/crypttech_cryptolog_login_exec
- exploit/linux/http/cve_2019_1663_cisco_rmi_rce
- exploit/linux/http/dcos_marathon
- exploit/linux/http/ddwrt_cgibin_exec
- exploit/linux/http/denyall_waf_exec
- exploit/linux/http/dlink_authentication_cgi_bof
- exploit/linux/http/dlink_command_php_exec_noauth
- exploit/linux/http/dlink_dcs931l_upload
- exploit/linux/http/dlink_dcs_930l_authenticated_remote_command_execution
- exploit/linux/http/dlink_diagnostic_exec_noauth
- exploit/linux/http/dlink_dir300_exec_telnet
- exploit/linux/http/dlink_dir605l_captcha_bof
- exploit/linux/http/dlink_dir615_up_exec
- exploit/linux/http/dlink_dir850l_unauth_exec
- exploit/linux/http/dlink_dsl2750b_exec_noauth
- exploit/linux/http/dlink_dspw110_cookie_noauth_exec
- exploit/linux/http/dlink_dspw215_info_cgi_bof
- exploit/linux/http/dlink_dwl_2600_command_injection
- exploit/linux/http/dlink_hedwig_cgi_bof
- exploit/linux/http/dlink_hnap_bof
- exploit/linux/http/dlink_hnap_header_exec_noauth
- exploit/linux/http/dlink_hnap_login_bof
- exploit/linux/http/dlink_upnp_exec_noauth
- exploit/linux/http/dnalims_admin_exec
- exploit/linux/http/docker_daemon_tcp
- exploit/linux/http/dolibarr_cmd_exec
- exploit/linux/http/dreambox_openpli_shell
- exploit/linux/http/efw_chpasswd_exec
- exploit/linux/http/elfinder_archive_cmd_injection
- exploit/linux/http/empire_skywalker
- exploit/linux/http/esva_exec
- exploit/linux/http/eyesofnetwork_autodiscovery_rce
- exploit/linux/http/f5_bigip_tmui_rce_cve_2020_5902
- exploit/linux/http/f5_bigip_tmui_rce_cve_2023_46747
- exploit/linux/http/f5_icall_cmd
- exploit/linux/http/f5_icontrol_exec
- exploit/linux/http/f5_icontrol_rce
- exploit/linux/http/f5_icontrol_rest_ssrf_rce
- exploit/linux/http/f5_icontrol_rpmspec_rce_cve_2022_41800
- exploit/linux/http/f5_icontrol_soap_csrf_rce_cve_2022_41622
- exploit/linux/http/flir_ax8_unauth_rce_cve_2022_37061
- exploit/linux/http/foreman_openstack_satellite_code_exec
- exploit/linux/http/fortinac_keyupload_file_write
- exploit/linux/http/fortinet_authentication_bypass_cve_2022_40684
- exploit/linux/http/fritzbox_echo_exec
- exploit/linux/http/froxlor_log_path_rce
- exploit/linux/http/geutebruck_cmdinject_cve_2021_335xx
- exploit/linux/http/geutebruck_instantrec_bof
- exploit/linux/http/geutebruck_testaction_exec
- exploit/linux/http/github_enterprise_secret
- exploit/linux/http/gitlist_exec
- exploit/linux/http/glinet_unauth_rce_cve_2023_50445
- exploit/linux/http/glpi_htmlawed_php_injection
- exploit/linux/http/goahead_ldpreload
- exploit/linux/http/goautodial_3_rce_command_injection
- exploit/linux/http/gpsd_format_string
- exploit/linux/http/grandstream_gxv31xx_settimezone_unauth_cmd_exec
- exploit/linux/http/grandstream_ucm62xx_sendemail_rce
- exploit/linux/http/gravcms_exec
- exploit/linux/http/groundwork_monarch_cmd_exec
- exploit/linux/http/h2_webinterface_rce
- exploit/linux/http/hadoop_unauth_exec
- exploit/linux/http/hikvision_cve_2021_36260_blind
- exploit/linux/http/hp_system_management
- exploit/linux/http/hp_van_sdn_cmd_inject
- exploit/linux/http/huawei_hg532n_cmdinject
- exploit/linux/http/ibm_drm_rce
- exploit/linux/http/ibm_qradar_unauth_rce
- exploit/linux/http/imperva_securesphere_exec
- exploit/linux/http/ipfire_bashbug_exec
- exploit/linux/http/ipfire_oinkcode_exec
- exploit/linux/http/ipfire_pakfire_exec
- exploit/linux/http/ipfire_proxy_exec
- exploit/linux/http/ivanti_connect_secure_rce_cve_2023_46805
- exploit/linux/http/ivanti_connect_secure_rce_cve_2024_21893
- exploit/linux/http/ivanti_csa_unauth_rce_cve_2021_44529
- exploit/linux/http/ivanti_sentry_misc_log_service
- exploit/linux/http/jenkins_cli_deserialization
- exploit/linux/http/kafka_ui_unauth_rce_cve_2023_52251
- exploit/linux/http/kaltura_unserialize_cookie_rce
- exploit/linux/http/kaltura_unserialize_rce
- exploit/linux/http/kibana_timelion_prototype_pollution_rce
- exploit/linux/http/kibana_upgrade_assistant_telemetry_rce
- exploit/linux/http/klog_server_authenticate_user_unauth_command_injection
- exploit/linux/http/kloxo_sqli
- exploit/linux/http/lexmark_faxtrace_settings
- exploit/linux/http/librenms_addhost_cmd_inject
- exploit/linux/http/librenms_collectd_cmd_inject
- exploit/linux/http/lifesize_uvc_ping_rce
- exploit/linux/http/linear_emerge_unauth_rce_cve_2019_7256
- exploit/linux/http/linksys_apply_cgi
- exploit/linux/http/linksys_e1500_apply_exec
- exploit/linux/http/linksys_themoon_exec
- exploit/linux/http/linksys_wrt110_cmd_exec
- exploit/linux/http/linksys_wrt160nv2_apply_exec
- exploit/linux/http/linksys_wrt54gl_apply_exec
- exploit/linux/http/linksys_wvbr0_user_agent_exec_noauth
- exploit/linux/http/linuxki_rce
- exploit/linux/http/logsign_exec
- exploit/linux/http/lucee_admin_imgprocess_file_write
- exploit/linux/http/magnusbilling_unauth_rce_cve_2023_30258
- exploit/linux/http/mailcleaner_exec
- exploit/linux/http/majordomo_cmd_inject_cve_2023_50917
- exploit/linux/http/metabase_setup_token_rce
- exploit/linux/http/microfocus_obr_cmd_injection
- exploit/linux/http/microfocus_secure_messaging_gateway
- exploit/linux/http/mida_solutions_eframework_ajaxreq_rce
- exploit/linux/http/mobileiron_core_log4shell
- exploit/linux/http/mobileiron_mdm_hessian_rce
- exploit/linux/http/multi_ncc_ping_exec
- exploit/linux/http/mutiny_frontend_upload
- exploit/linux/http/mvpower_dvr_shell_exec
- exploit/linux/http/nagios_xi_autodiscovery_webshell
- exploit/linux/http/nagios_xi_chained_rce
- exploit/linux/http/nagios_xi_chained_rce_2_electric_boogaloo
- exploit/linux/http/nagios_xi_configwizards_authenticated_rce
- exploit/linux/http/nagios_xi_magpie_debug
- exploit/linux/http/nagios_xi_mibs_authenticated_rce
- exploit/linux/http/nagios_xi_plugins_check_plugin_authenticated_rce
- exploit/linux/http/nagios_xi_plugins_filename_authenticated_rce
- exploit/linux/http/nagios_xi_snmptrap_authenticated_rce
- exploit/linux/http/netgear_dgn1000_setup_unauth_exec
- exploit/linux/http/netgear_dgn1000b_setup_exec
- exploit/linux/http/netgear_dgn2200b_pppoe_exec
- exploit/linux/http/netgear_dnslookup_cmd_exec
- exploit/linux/http/netgear_r7000_cgibin_exec
- exploit/linux/http/netgear_readynas_exec
- exploit/linux/http/netgear_unauth_exec
- exploit/linux/http/netgear_wnr2000_rce
- exploit/linux/http/netis_unauth_rce_cve_2024_22729
- exploit/linux/http/netsweeper_webadmin_unixlogin
- exploit/linux/http/nexus_repo_manager_el_injection
- exploit/linux/http/nginx_chunked_size
- exploit/linux/http/nuuo_nvrmini_auth_rce
- exploit/linux/http/nuuo_nvrmini_unauth_rce
- exploit/linux/http/op5_config_exec
- exploit/linux/http/openfiler_networkcard_exec
- exploit/linux/http/openmetadata_auth_bypass_rce
- exploit/linux/http/opennms_horizon_authenticated_rce
- exploit/linux/http/opentsdb_key_cmd_injection
- exploit/linux/http/opentsdb_yrange_cmd_injection
- exploit/linux/http/optergy_bms_backdoor_rce_cve_2019_7276
- exploit/linux/http/oracle_ebs_rce_cve_2022_21587
- exploit/linux/http/pandora_fms_events_exec
- exploit/linux/http/pandora_fms_exec
- exploit/linux/http/pandora_fms_sqli
- exploit/linux/http/pandora_ping_cmd_exec
- exploit/linux/http/panos_op_cmd_exec
- exploit/linux/http/panos_readsessionvars
- exploit/linux/http/panos_telemetry_cmd_exec
- exploit/linux/http/peercast_url
- exploit/linux/http/php_imap_open_rce
- exploit/linux/http/pineapp_ldapsyncnow_exec
- exploit/linux/http/pineapp_livelog_exec
- exploit/linux/http/pineapp_test_li_conn_exec
- exploit/linux/http/pineapple_bypass_cmdinject
- exploit/linux/http/pineapple_preconfig_cmdinject
- exploit/linux/http/piranha_passwd_exec
- exploit/linux/http/progress_flowmon_unauth_cmd_injection
- exploit/linux/http/progress_kemp_loadmaster_unauth_cmd_injection
- exploit/linux/http/pulse_secure_cmd_exec
- exploit/linux/http/pulse_secure_gzip_rce
- exploit/linux/http/pyload_js2py_exec
- exploit/linux/http/qnap_qcenter_change_passwd_exec
- exploit/linux/http/qnap_qts_rce_cve_2023_47218
- exploit/linux/http/raidsonic_nas_ib5220_exec_noauth
- exploit/linux/http/railo_cfml_rfi
- exploit/linux/http/rancher_server
- exploit/linux/http/ray_agent_job_rce
- exploit/linux/http/ray_cpu_profile_cmd_injection_cve_2023_6019
- exploit/linux/http/rconfig_ajaxarchivefiles_rce
- exploit/linux/http/rconfig_vendors_auth_file_upload_rce
- exploit/linux/http/realtek_miniigd_upnp_exec_noauth
- exploit/linux/http/riverbed_netprofiler_netexpress_exec
- exploit/linux/http/roxy_wi_exec
- exploit/linux/http/saltstack_salt_api_cmd_exec
- exploit/linux/http/saltstack_salt_wheel_async_rce
- exploit/linux/http/samsung_srv_1670d_upload_exec
- exploit/linux/http/seagate_nas_php_exec_noauth
- exploit/linux/http/smt_ipmi_close_window_bof
- exploit/linux/http/solarview_unauth_rce_cve_2023_23333
- exploit/linux/http/sonicwall_cve_2021_20039
- exploit/linux/http/sophos_utm_webadmin_sid_cmd_injection
- exploit/linux/http/sophos_wpa_iface_exec
- exploit/linux/http/sophos_wpa_sblistpack_exec
- exploit/linux/http/sourcegraph_gitserver_sshcmd
- exploit/linux/http/spark_unauth_rce
- exploit/linux/http/spring_cloud_gateway_rce
- exploit/linux/http/suitecrm_log_file_rce
- exploit/linux/http/supervisor_xmlrpc_exec
- exploit/linux/http/symantec_messaging_gateway_exec
- exploit/linux/http/symantec_web_gateway_exec
- exploit/linux/http/symantec_web_gateway_file_upload
- exploit/linux/http/symantec_web_gateway_lfi
- exploit/linux/http/symantec_web_gateway_pbcontrol
- exploit/linux/http/symantec_web_gateway_restore
- exploit/linux/http/symmetricom_syncserver_rce
- exploit/linux/http/synology_dsm_sliceupload_exec_noauth
- exploit/linux/http/synology_dsm_smart_exec_auth
- exploit/linux/http/terramaster_unauth_rce_cve_2020_35665
- exploit/linux/http/terramaster_unauth_rce_cve_2021_45837
- exploit/linux/http/terramaster_unauth_rce_cve_2022_24990
- exploit/linux/http/tiki_calendar_exec
- exploit/linux/http/totolink_unauth_rce_cve_2023_30013
- exploit/linux/http/tp_link_ncxxx_bonjour_command_injection
- exploit/linux/http/tp_link_sc2020n_authenticated_telnet_injection
- exploit/linux/http/tr064_ntpserver_cmdinject
- exploit/linux/http/traccar_rce_upload
- exploit/linux/http/trend_micro_imsva_exec
- exploit/linux/http/trendmicro_imsva_widget_exec
- exploit/linux/http/trendmicro_sps_exec
- exploit/linux/http/trendmicro_websecurity_exec
- exploit/linux/http/trueonline_billion_5200w_rce
- exploit/linux/http/trueonline_p660hn_v1_rce
- exploit/linux/http/trueonline_p660hn_v2_rce
- exploit/linux/http/ubiquiti_airos_file_upload
- exploit/linux/http/ueb_api_rce
- exploit/linux/http/unraid_auth_bypass_exec
- exploit/linux/http/vap2500_tools_command_exec
- exploit/linux/http/vcms_upload
- exploit/linux/http/vestacp_exec
- exploit/linux/http/vinchin_backup_recovery_cmd_inject
- exploit/linux/http/vmware_nsxmgr_xstream_rce_cve_2021_39144
- exploit/linux/http/vmware_vcenter_analytics_file_upload
- exploit/linux/http/vmware_vcenter_vsan_health_rce
- exploit/linux/http/vmware_view_planner_4_6_uploadlog_rce
- exploit/linux/http/vmware_vrli_rce
- exploit/linux/http/vmware_vrni_rce_cve_2023_20887
- exploit/linux/http/vmware_vrops_mgr_ssrf_rce
- exploit/linux/http/vmware_workspace_one_access_cve_2022_22954
- exploit/linux/http/vmware_workspace_one_access_vmsa_2022_0011_chain
- exploit/linux/http/wanem_exec
- exploit/linux/http/watchguard_firebox_unauth_rce_cve_2022_26318
- exploit/linux/http/wd_mycloud_multiupload_upload
- exploit/linux/http/wd_mycloud_unauthenticated_cmd_injection
- exploit/linux/http/webcalendar_settings_exec
- exploit/linux/http/webid_converter
- exploit/linux/http/webmin_backdoor
- exploit/linux/http/webmin_file_manager_rce
- exploit/linux/http/webmin_package_updates_rce
- exploit/linux/http/webmin_packageup_rce
- exploit/linux/http/wepresent_cmd_injection
- exploit/linux/http/wipg1000_cmd_injection
- exploit/linux/http/xplico_exec
- exploit/linux/http/zabbix_sqli
- exploit/linux/http/zen_load_balancer_exec
- exploit/linux/http/zenoss_showdaemonxmlconfig_exec
- exploit/linux/http/zimbra_cpio_cve_2022_41352
- exploit/linux/http/zimbra_mboximport_cve_2022_27925
- exploit/linux/http/zimbra_unrar_cve_2022_30333
- exploit/linux/http/zimbra_xxe_rce
- exploit/linux/http/zyxel_lfi_unauth_ssh_rce
- exploit/linux/http/zyxel_parse_config_rce
- exploit/linux/http/zyxel_ztp_rce
- ids (2)
- imap (1)
- local (91)
- exploit/linux/local/abrt_raceabrt_priv_esc
- exploit/linux/local/abrt_sosreport_priv_esc
- exploit/linux/local/af_packet_chocobo_root_priv_esc
- exploit/linux/local/af_packet_packet_set_ring_priv_esc
- exploit/linux/local/ansible_node_deployer
- exploit/linux/local/apport_abrt_chroot_priv_esc
- exploit/linux/local/apt_package_manager_persistence
- exploit/linux/local/asan_suid_executable_priv_esc
- exploit/linux/local/autostart_persistence
- exploit/linux/local/bash_profile_persistence
- exploit/linux/local/blueman_set_dhcp_handler_dbus_priv_esc
- exploit/linux/local/bpf_priv_esc
- exploit/linux/local/bpf_sign_extension_priv_esc
- exploit/linux/local/cpi_runrshell_priv_esc
- exploit/linux/local/cron_persistence
- exploit/linux/local/cve_2021_3490_ebpf_alu32_bounds_check_lpe
- exploit/linux/local/cve_2021_3493_overlayfs
- exploit/linux/local/cve_2021_38648_omigod
- exploit/linux/local/cve_2021_4034_pwnkit_lpe_pkexec
- exploit/linux/local/cve_2022_0847_dirtypipe
- exploit/linux/local/cve_2022_0995_watch_queue
- exploit/linux/local/cve_2022_1043_io_uring_priv_esc
- exploit/linux/local/cve_2023_0386_overlayfs_priv_esc
- exploit/linux/local/desktop_privilege_escalation
- exploit/linux/local/diamorphine_rootkit_signal_priv_esc
- exploit/linux/local/docker_cgroup_escape
- exploit/linux/local/docker_daemon_privilege_escalation
- exploit/linux/local/docker_privileged_container_escape
- exploit/linux/local/docker_privileged_container_kernel_escape
- exploit/linux/local/docker_runc_escape
- exploit/linux/local/exim4_deliver_message_priv_esc
- exploit/linux/local/f5_create_user
- exploit/linux/local/glibc_ld_audit_dso_load_priv_esc
- exploit/linux/local/glibc_origin_expansion_priv_esc
- exploit/linux/local/glibc_realpath_priv_esc
- exploit/linux/local/glibc_tunables_priv_esc
- exploit/linux/local/hp_smhstart
- exploit/linux/local/hp_xglance_priv_esc
- exploit/linux/local/juju_run_agent_priv_esc
- exploit/linux/local/kloxo_lxsuexec
- exploit/linux/local/ktsuss_suid_priv_esc
- exploit/linux/local/lastore_daemon_dbus_priv_esc
- exploit/linux/local/libuser_roothelper_priv_esc
- exploit/linux/local/motd_persistence
- exploit/linux/local/nested_namespace_idmap_limit_priv_esc
- exploit/linux/local/netfilter_nft_set_elem_init_privesc
- exploit/linux/local/netfilter_priv_esc_ipv4
- exploit/linux/local/netfilter_xtables_heap_oob_write_priv_esc
- exploit/linux/local/network_manager_vpnc_username_priv_esc
- exploit/linux/local/ntfs3g_priv_esc
- exploit/linux/local/omniresolve_suid_priv_esc
- exploit/linux/local/overlayfs_priv_esc
- exploit/linux/local/pihole_remove_commands_lpe
- exploit/linux/local/pkexec
- exploit/linux/local/polkit_dbus_auth_bypass
- exploit/linux/local/progress_flowmon_sudo_privesc_2024
- exploit/linux/local/progress_kemp_loadmaster_sudo_privesc_2024
- exploit/linux/local/ptrace_sudo_token_priv_esc
- exploit/linux/local/ptrace_traceme_pkexec_helper
- exploit/linux/local/rc_local_persistence
- exploit/linux/local/rds_atomic_free_op_null_pointer_deref_priv_esc
- exploit/linux/local/rds_rds_page_copy_user_priv_esc
- exploit/linux/local/recvmmsg_priv_esc
- exploit/linux/local/reptile_rootkit_reptile_cmd_priv_esc
- exploit/linux/local/runc_cwd_priv_esc
- exploit/linux/local/saltstack_salt_minion_deployer
- exploit/linux/local/service_persistence
- exploit/linux/local/servu_ftp_server_prepareinstallation_priv_esc
- exploit/linux/local/sock_sendpage
- exploit/linux/local/sophos_wpa_clear_keys
- exploit/linux/local/su_login
- exploit/linux/local/sudo_baron_samedit
- exploit/linux/local/sudoedit_bypass_priv_esc
- exploit/linux/local/systemtap_modprobe_options_priv_esc
- exploit/linux/local/tomcat_rhel_based_temp_priv_esc
- exploit/linux/local/tomcat_ubuntu_log_init_priv_esc
- exploit/linux/local/ubuntu_enlightenment_mount_priv_esc
- exploit/linux/local/udev_netlink
- exploit/linux/local/ueb_bpserverd_privesc
- exploit/linux/local/ufo_privilege_escalation
- exploit/linux/local/vcenter_java_wrapper_vmon_priv_esc
- exploit/linux/local/vmware_alsa_config
- exploit/linux/local/vmware_mount
- exploit/linux/local/vmware_workspace_one_access_certproxy_lpe
- exploit/linux/local/vmware_workspace_one_access_cve_2022_22960
- exploit/linux/local/vmwgfx_fd_priv_esc
- exploit/linux/local/yum_package_manager_persistence
- exploit/linux/local/zimbra_postfix_priv_esc
- exploit/linux/local/zimbra_slapper_priv_esc
- exploit/linux/local/zpanel_zsudo
- exploit/linux/local/zyxel_suid_cp_lpe
- misc (41)
- exploit/linux/misc/accellion_fta_mpipe2
- exploit/linux/misc/aerospike_database_udf_cmd_exec
- exploit/linux/misc/asus_infosvr_auth_bypass_exec
- exploit/linux/misc/cisco_ios_xe_rce
- exploit/linux/misc/cisco_rv340_sslvpn
- exploit/linux/misc/cve_2020_13160_anydesk
- exploit/linux/misc/cve_2021_38647_omigod
- exploit/linux/misc/gld_postfix
- exploit/linux/misc/hid_discoveryd_command_blink_on_unauth_rce
- exploit/linux/misc/hikvision_rtsp_bof
- exploit/linux/misc/hp_data_protector_cmd_exec
- exploit/linux/misc/hp_jetdirect_path_traversal
- exploit/linux/misc/hp_nnmi_pmd_bof
- exploit/linux/misc/hp_vsa_login_bof
- exploit/linux/misc/hplip_hpssd_exec
- exploit/linux/misc/ib_inet_connect
- exploit/linux/misc/ib_jrd8_create_database
- exploit/linux/misc/ib_open_marker_file
- exploit/linux/misc/ib_pwd_db_aliased
- exploit/linux/misc/igel_command_injection
- exploit/linux/misc/jenkins_java_deserialize
- exploit/linux/misc/jenkins_ldap_deserialize
- exploit/linux/misc/lprng_format_string
- exploit/linux/misc/mongod_native_helper
- exploit/linux/misc/nagios_nrpe_arguments
- exploit/linux/misc/netcore_udp_53413_backdoor
- exploit/linux/misc/netsupport_manager_agent
- exploit/linux/misc/nimbus_gettopologyhistory_cmd_exec
- exploit/linux/misc/novell_edirectory_ncp_bof
- exploit/linux/misc/opennms_java_serialize
- exploit/linux/misc/qnap_transcode_server
- exploit/linux/misc/quest_pmmasterd_bof
- exploit/linux/misc/saltstack_salt_unauth_rce
- exploit/linux/misc/sercomm_exec
- exploit/linux/misc/tplink_archer_a7_c7_lan_rce
- exploit/linux/misc/ueb9_bpserverd
- exploit/linux/misc/unidata_udadmin_auth_bypass
- exploit/linux/misc/unidata_udadmin_password_stack_overflow
- exploit/linux/misc/zabbix_server_exec
- exploit/linux/misc/zyxel_ike_decoder_rce_cve_2023_28771
- exploit/linux/misc/zyxel_multiple_devices_zhttp_lan_rce
- mysql (2)
- pop3 (1)
- postgres (1)
- pptp (1)
- proxy (1)
- redis (2)
- samba (5)
- smtp (4)
- snmp (2)
- ssh (15)
- exploit/linux/ssh/ceragon_fibeair_known_privkey
- exploit/linux/ssh/cisco_ucs_scpuser
- exploit/linux/ssh/exagrid_known_privkey
- exploit/linux/ssh/f5_bigip_known_privkey
- exploit/linux/ssh/ibm_drm_a3user
- exploit/linux/ssh/loadbalancerorg_enterprise_known_privkey
- exploit/linux/ssh/mercurial_ssh_exec
- exploit/linux/ssh/microfocus_obr_shrboadmin
- exploit/linux/ssh/quantum_dxi_known_privkey
- exploit/linux/ssh/quantum_vmpro_backdoor
- exploit/linux/ssh/solarwinds_lem_exec
- exploit/linux/ssh/symantec_smg_ssh
- exploit/linux/ssh/vmware_vdp_known_privkey
- exploit/linux/ssh/vmware_vrni_known_privkey
- exploit/linux/ssh/vyos_restricted_shell_privesc
- telnet (2)
- upnp (5)
- mainframe (1)
- multi (458)
- browser (49)
- exploit/multi/browser/adobe_flash_hacking_team_uaf
- exploit/multi/browser/adobe_flash_nellymoser_bof
- exploit/multi/browser/adobe_flash_net_connection_confusion
- exploit/multi/browser/adobe_flash_opaque_background_uaf
- exploit/multi/browser/adobe_flash_pixel_bender_bof
- exploit/multi/browser/adobe_flash_shader_drawing_fill
- exploit/multi/browser/adobe_flash_shader_job_overflow
- exploit/multi/browser/adobe_flash_uncompress_zlib_uaf
- exploit/multi/browser/chrome_array_map
- exploit/multi/browser/chrome_cve_2021_21220_v8_insufficient_validation
- exploit/multi/browser/chrome_jscreate_sideeffect
- exploit/multi/browser/chrome_object_create
- exploit/multi/browser/chrome_simplifiedlowering_overflow
- exploit/multi/browser/firefox_escape_retval
- exploit/multi/browser/firefox_jit_use_after_free
- exploit/multi/browser/firefox_pdfjs_privilege_escalation
- exploit/multi/browser/firefox_proto_crmfrequest
- exploit/multi/browser/firefox_proxy_prototype
- exploit/multi/browser/firefox_queryinterface
- exploit/multi/browser/firefox_svg_plugin
- exploit/multi/browser/firefox_tostring_console_injection
- exploit/multi/browser/firefox_webidl_injection
- exploit/multi/browser/firefox_xpi_bootstrapped_addon
- exploit/multi/browser/itms_overflow
- exploit/multi/browser/java_atomicreferencearray
- exploit/multi/browser/java_calendar_deserialize
- exploit/multi/browser/java_getsoundbank_bof
- exploit/multi/browser/java_jre17_driver_manager
- exploit/multi/browser/java_jre17_exec
- exploit/multi/browser/java_jre17_glassfish_averagerangestatisticimpl
- exploit/multi/browser/java_jre17_jaxws
- exploit/multi/browser/java_jre17_jmxbean
- exploit/multi/browser/java_jre17_jmxbean_2
- exploit/multi/browser/java_jre17_method_handle
- exploit/multi/browser/java_jre17_provider_skeleton
- exploit/multi/browser/java_jre17_reflection_types
- exploit/multi/browser/java_rhino
- exploit/multi/browser/java_rmi_connection_impl
- exploit/multi/browser/java_setdifficm_bof
- exploit/multi/browser/java_signed_applet
- exploit/multi/browser/java_storeimagearray
- exploit/multi/browser/java_trusted_chain
- exploit/multi/browser/java_verifier_field_access
- exploit/multi/browser/mozilla_compareto
- exploit/multi/browser/mozilla_navigatorjava
- exploit/multi/browser/msfd_rce_browser
- exploit/multi/browser/opera_configoverwrite
- exploit/multi/browser/opera_historysearch
- exploit/multi/browser/qtjava_pointer
- elasticsearch (2)
- fileformat (16)
- exploit/multi/fileformat/adobe_u3d_meshcont
- exploit/multi/fileformat/archive_tar_arb_file_write
- exploit/multi/fileformat/evince_cbt_cmd_injection
- exploit/multi/fileformat/ghostscript_failed_restore
- exploit/multi/fileformat/ghostscript_format_string_cve_2024_29510
- exploit/multi/fileformat/gitlens_local_config_exec
- exploit/multi/fileformat/js_unpacker_eval_injection
- exploit/multi/fileformat/libreoffice_logo_exec
- exploit/multi/fileformat/libreoffice_macro_exec
- exploit/multi/fileformat/maple_maplet
- exploit/multi/fileformat/nodejs_js_yaml_load_code_exec
- exploit/multi/fileformat/office_word_macro
- exploit/multi/fileformat/peazip_command_injection
- exploit/multi/fileformat/swagger_param_inject
- exploit/multi/fileformat/visual_studio_vsix_exec
- exploit/multi/fileformat/zip_slip
- ftp (2)
- gdb (1)
- hams (1)
- http (308)
- exploit/multi/http/activecollab_chat
- exploit/multi/http/adobe_coldfusion_rce_cve_2023_26360
- exploit/multi/http/agent_tesla_panel_rce
- exploit/multi/http/ajaxplorer_checkinstall_exec
- exploit/multi/http/apache_activemq_upload_jsp
- exploit/multi/http/apache_apisix_api_default_token_rce
- exploit/multi/http/apache_commons_text4shell
- exploit/multi/http/apache_couchdb_erlang_rce
- exploit/multi/http/apache_druid_cve_2023_25194
- exploit/multi/http/apache_flink_jar_upload_exec
- exploit/multi/http/apache_jetspeed_file_upload
- exploit/multi/http/apache_mod_cgi_bash_env_exec
- exploit/multi/http/apache_nifi_processor_rce
- exploit/multi/http/apache_normalize_path_rce
- exploit/multi/http/apache_ofbiz_forgot_password_directory_traversal
- exploit/multi/http/apache_rocketmq_update_config
- exploit/multi/http/apache_roller_ognl_injection
- exploit/multi/http/apprain_upload_exec
- exploit/multi/http/atlassian_confluence_namespace_ognl_injection
- exploit/multi/http/atlassian_confluence_rce_cve_2023_22515
- exploit/multi/http/atlassian_confluence_rce_cve_2023_22527
- exploit/multi/http/atlassian_confluence_rce_cve_2024_21683
- exploit/multi/http/atlassian_confluence_unauth_backup
- exploit/multi/http/atlassian_confluence_webwork_ognl_injection
- exploit/multi/http/atlassian_crowd_pdkinstall_plugin_upload_rce
- exploit/multi/http/atutor_sqli
- exploit/multi/http/atutor_upload_traversal
- exploit/multi/http/auxilium_upload_exec
- exploit/multi/http/avideo_wwbnindex_unauth_rce
- exploit/multi/http/axis2_deployer
- exploit/multi/http/baldr_upload_exec
- exploit/multi/http/bassmaster_js_injection
- exploit/multi/http/bitbucket_env_var_rce
- exploit/multi/http/bolt_file_upload
- exploit/multi/http/builderengine_upload_exec
- exploit/multi/http/cacti_package_import_rce
- exploit/multi/http/cacti_pollers_sqli_rce
- exploit/multi/http/caidao_php_backdoor_exec
- exploit/multi/http/churchinfo_upload_exec
- exploit/multi/http/cisco_dcnm_upload
- exploit/multi/http/cisco_dcnm_upload_2019
- exploit/multi/http/clipbucket_fileupload_exec
- exploit/multi/http/cmsms_object_injection_rce
- exploit/multi/http/cmsms_showtime2_rce
- exploit/multi/http/cmsms_upload_rename_rce
- exploit/multi/http/cockpit_cms_rce
- exploit/multi/http/coldfusion_ckeditor_file_upload
- exploit/multi/http/coldfusion_rds_auth_bypass
- exploit/multi/http/confluence_widget_connector
- exploit/multi/http/connectwise_screenconnect_rce_cve_2024_1709
- exploit/multi/http/crushftp_rce_cve_2023_43177
- exploit/multi/http/cups_bash_env_exec
- exploit/multi/http/cuteflow_upload_exec
- exploit/multi/http/cve_2021_35464_forgerock_openam
- exploit/multi/http/cve_2023_38836_boidcms
- exploit/multi/http/dexter_casinoloader_exec
- exploit/multi/http/dotcms_file_upload_rce
- exploit/multi/http/drupal_drupageddon
- exploit/multi/http/eaton_nsm_code_exec
- exploit/multi/http/eventlog_file_upload
- exploit/multi/http/extplorer_upload_exec
- exploit/multi/http/familycms_less_exec
- exploit/multi/http/fortra_goanywhere_mft_rce_cve_2024_0204
- exploit/multi/http/fortra_goanywhere_rce_cve_2023_0669
- exploit/multi/http/freenas_exec_raw
- exploit/multi/http/gambio_unauth_rce_cve_2024_23759
- exploit/multi/http/geoserver_unauth_rce_cve_2024_36401
- exploit/multi/http/gestioip_exec
- exploit/multi/http/getsimplecms_unauth_code_exec
- exploit/multi/http/gibbon_auth_rce_cve_2024_24725
- exploit/multi/http/git_client_command_exec
- exploit/multi/http/git_lfs_clone_command_exec
- exploit/multi/http/git_submodule_command_exec
- exploit/multi/http/git_submodule_url_exec
- exploit/multi/http/gitea_git_fetch_rce
- exploit/multi/http/gitea_git_hooks_rce
- exploit/multi/http/gitlab_exif_rce
- exploit/multi/http/gitlab_file_read_rce
- exploit/multi/http/gitlab_github_import_rce_cve_2022_2992
- exploit/multi/http/gitlab_shell_exec
- exploit/multi/http/gitlist_arg_injection
- exploit/multi/http/gitorious_graph
- exploit/multi/http/glassfish_deployer
- exploit/multi/http/glossword_upload_exec
- exploit/multi/http/glpi_install_rce
- exploit/multi/http/gogs_git_hooks_rce
- exploit/multi/http/horde_csv_rce
- exploit/multi/http/horde_form_file_upload
- exploit/multi/http/horde_href_backdoor
- exploit/multi/http/horizontcms_upload_exec
- exploit/multi/http/hp_sitescope_issuesiebelcmd
- exploit/multi/http/hp_sitescope_uploadfileshandler
- exploit/multi/http/hp_sys_mgmt_exec
- exploit/multi/http/hyperic_hq_script_console
- exploit/multi/http/ibm_openadmin_tool_soap_welcomeserver_exec
- exploit/multi/http/ispconfig_php_exec
- exploit/multi/http/jboss_bshdeployer
- exploit/multi/http/jboss_deploymentfilerepository
- exploit/multi/http/jboss_invoke_deploy
- exploit/multi/http/jboss_maindeployer
- exploit/multi/http/jboss_seam_upload_exec
- exploit/multi/http/jenkins_metaprogramming
- exploit/multi/http/jenkins_script_console
- exploit/multi/http/jenkins_xstream_deserialize
- exploit/multi/http/jetbrains_teamcity_rce_cve_2023_42793
- exploit/multi/http/jetbrains_teamcity_rce_cve_2024_27198
- exploit/multi/http/jira_hipchat_template
- exploit/multi/http/jira_plugin_upload
- exploit/multi/http/joomla_http_header_rce
- exploit/multi/http/kong_gateway_admin_api_rce
- exploit/multi/http/kordil_edms_upload_exec
- exploit/multi/http/lcms_php_exec
- exploit/multi/http/liferay_java_unmarshalling
- exploit/multi/http/log1cms_ajax_create_folder
- exploit/multi/http/log4shell_header_injection
- exploit/multi/http/lucee_scheduled_job
- exploit/multi/http/magento_unserialize
- exploit/multi/http/makoserver_cmd_exec
- exploit/multi/http/manage_engine_dc_pmp_sqli
- exploit/multi/http/manageengine_adselfservice_plus_saml_rce_cve_2022_47966
- exploit/multi/http/manageengine_auth_upload
- exploit/multi/http/manageengine_sd_uploader
- exploit/multi/http/manageengine_search_sqli
- exploit/multi/http/manageengine_servicedesk_plus_saml_rce_cve_2022_47966
- exploit/multi/http/mantisbt_manage_proj_page_rce
- exploit/multi/http/mantisbt_php_exec
- exploit/multi/http/maracms_upload_exec
- exploit/multi/http/mediawiki_syntaxhighlight
- exploit/multi/http/mediawiki_thumb
- exploit/multi/http/metasploit_static_secret_key_base
- exploit/multi/http/metasploit_webui_console_command_execution
- exploit/multi/http/microfocus_obm_auth_rce
- exploit/multi/http/microfocus_ucmdb_unauth_deser
- exploit/multi/http/mirth_connect_cve_2023_43208
- exploit/multi/http/mma_backdoor_upload
- exploit/multi/http/mobilecartly_upload_exec
- exploit/multi/http/monitorr_webshell_rce_cve_2020_28871
- exploit/multi/http/monstra_fileupload_exec
- exploit/multi/http/moodle_admin_shell_upload
- exploit/multi/http/moodle_spelling_binary_rce
- exploit/multi/http/moodle_spelling_path_rce
- exploit/multi/http/moodle_teacher_enrollment_priv_esc_to_rce
- exploit/multi/http/movabletype_upgrade_exec
- exploit/multi/http/mutiny_subnetmask_exec
- exploit/multi/http/mybb_rce_cve_2022_24734
- exploit/multi/http/nas4free_php_exec
- exploit/multi/http/navigate_cms_rce
- exploit/multi/http/netwin_surgeftp_exec
- exploit/multi/http/nibbleblog_file_upload
- exploit/multi/http/nostromo_code_exec
- exploit/multi/http/novell_servicedesk_rce
- exploit/multi/http/nuuo_nvrmini_upgrade_rce
- exploit/multi/http/october_upload_bypass_exec
- exploit/multi/http/op5_license
- exploit/multi/http/op5_welcome
- exploit/multi/http/open_web_analytics_rce
- exploit/multi/http/openfire_auth_bypass
- exploit/multi/http/openfire_auth_bypass_rce_cve_2023_32315
- exploit/multi/http/openmrs_deserialization
- exploit/multi/http/openx_backdoor_php
- exploit/multi/http/opmanager_socialit_file_upload
- exploit/multi/http/opmanager_sumpdu_deserialization
- exploit/multi/http/oracle_ats_file_upload
- exploit/multi/http/oracle_reports_rce
- exploit/multi/http/oracle_weblogic_wsat_deserialization_rce
- exploit/multi/http/orientdb_exec
- exploit/multi/http/oscommerce_installer_unauth_code_exec
- exploit/multi/http/pandora_upload_exec
- exploit/multi/http/papercut_ng_auth_bypass
- exploit/multi/http/pentaho_business_server_authbypass_and_ssti
- exploit/multi/http/pgadmin_session_deserialization
- exploit/multi/http/phoenix_exec
- exploit/multi/http/php_cgi_arg_injection
- exploit/multi/http/php_fpm_rce
- exploit/multi/http/php_utility_belt_rce
- exploit/multi/http/php_volunteer_upload_exec
- exploit/multi/http/phpfilemanager_rce
- exploit/multi/http/phpldapadmin_query_engine
- exploit/multi/http/phpmailer_arg_injection
- exploit/multi/http/phpmoadmin_exec
- exploit/multi/http/phpmyadmin_3522_backdoor
- exploit/multi/http/phpmyadmin_lfi_rce
- exploit/multi/http/phpmyadmin_null_termination_exec
- exploit/multi/http/phpmyadmin_preg_replace
- exploit/multi/http/phpscheduleit_start_date
- exploit/multi/http/phpstudy_backdoor_rce
- exploit/multi/http/phptax_exec
- exploit/multi/http/phpwiki_ploticus_exec
- exploit/multi/http/pimcore_unserialize_rce
- exploit/multi/http/playsms_filename_exec
- exploit/multi/http/playsms_template_injection
- exploit/multi/http/playsms_uploadcsv_exec
- exploit/multi/http/plone_popen2
- exploit/multi/http/pmwiki_pagelist
- exploit/multi/http/polarcms_upload_exec
- exploit/multi/http/processmaker_exec
- exploit/multi/http/processmaker_plugin_upload
- exploit/multi/http/qdpm_authenticated_rce
- exploit/multi/http/qdpm_upload_exec
- exploit/multi/http/rails_actionpack_inline_exec
- exploit/multi/http/rails_double_tap
- exploit/multi/http/rails_dynamic_render_code_exec
- exploit/multi/http/rails_json_yaml_code_exec
- exploit/multi/http/rails_secret_deserialization
- exploit/multi/http/rails_web_console_v2_code_exec
- exploit/multi/http/rails_xml_yaml_code_exec
- exploit/multi/http/rocket_servergraph_file_requestor_rce
- exploit/multi/http/rudder_server_sqli_rce
- exploit/multi/http/sflog_upload_exec
- exploit/multi/http/shiro_rememberme_v124_deserialize
- exploit/multi/http/shopware_createinstancefromnamedarguments_rce
- exploit/multi/http/simple_backdoors_exec
- exploit/multi/http/sit_file_upload
- exploit/multi/http/snortreport_exec
- exploit/multi/http/solarwinds_store_manager_auth_filter
- exploit/multi/http/solr_velocity_rce
- exploit/multi/http/sonicwall_gms_upload
- exploit/multi/http/sonicwall_scrutinizer_methoddetail_sqli
- exploit/multi/http/sonicwall_shell_injection_cve_2023_34124
- exploit/multi/http/spip_bigup_unauth_rce
- exploit/multi/http/spip_connect_exec
- exploit/multi/http/spip_porte_plume_previsu_rce
- exploit/multi/http/spip_rce_form
- exploit/multi/http/splunk_mappy_exec
- exploit/multi/http/splunk_privilege_escalation_cve_2023_32707
- exploit/multi/http/splunk_upload_app_exec
- exploit/multi/http/spree_search_exec
- exploit/multi/http/spree_searchlogic_exec
- exploit/multi/http/spring_cloud_function_spel_injection
- exploit/multi/http/spring_framework_rce_spring4shell
- exploit/multi/http/struts2_code_exec_showcase
- exploit/multi/http/struts2_content_type_ognl
- exploit/multi/http/struts2_multi_eval_ognl
- exploit/multi/http/struts2_namespace_ognl
- exploit/multi/http/struts2_rest_xstream
- exploit/multi/http/struts_code_exec
- exploit/multi/http/struts_code_exec_classloader
- exploit/multi/http/struts_code_exec_exception_delegator
- exploit/multi/http/struts_code_exec_parameters
- exploit/multi/http/struts_default_action_mapper
- exploit/multi/http/struts_dev_mode
- exploit/multi/http/struts_dmi_exec
- exploit/multi/http/struts_dmi_rest_exec
- exploit/multi/http/struts_include_params
- exploit/multi/http/stunshell_eval
- exploit/multi/http/stunshell_exec
- exploit/multi/http/subrion_cms_file_upload_rce
- exploit/multi/http/sugarcrm_webshell_cve_2023_22952
- exploit/multi/http/sun_jsws_dav_options
- exploit/multi/http/sysaid_auth_file_upload
- exploit/multi/http/sysaid_rdslogs_file_upload
- exploit/multi/http/testlink_upload_exec
- exploit/multi/http/tomcat_jsp_upload_bypass
- exploit/multi/http/tomcat_mgr_deploy
- exploit/multi/http/tomcat_mgr_upload
- exploit/multi/http/torchserver_cve_2023_43654
- exploit/multi/http/totaljs_cms_widget_exec
- exploit/multi/http/traq_plugin_exec
- exploit/multi/http/trendmicro_threat_discovery_admin_sys_time_cmdi
- exploit/multi/http/ubiquiti_unifi_log4shell
- exploit/multi/http/uptime_file_upload_1
- exploit/multi/http/uptime_file_upload_2
- exploit/multi/http/v0pcr3w_exec
- exploit/multi/http/vbseo_proc_deutf
- exploit/multi/http/vbulletin_getindexablecontent
- exploit/multi/http/vbulletin_unserialize
- exploit/multi/http/vbulletin_widget_template_rce
- exploit/multi/http/vbulletin_widgetconfig_rce
- exploit/multi/http/visual_mining_netcharts_upload
- exploit/multi/http/vmware_vcenter_log4shell
- exploit/multi/http/vmware_vcenter_uploadova_rce
- exploit/multi/http/vtiger_install_rce
- exploit/multi/http/vtiger_logo_upload_exec
- exploit/multi/http/vtiger_php_exec
- exploit/multi/http/vtiger_soap_upload
- exploit/multi/http/weblogic_admin_handle_rce
- exploit/multi/http/webnms_file_upload
- exploit/multi/http/webpagetest_upload_exec
- exploit/multi/http/werkzeug_debug_rce
- exploit/multi/http/wikka_spam_exec
- exploit/multi/http/wp_ait_csv_rce
- exploit/multi/http/wp_backup_migration_php_filter
- exploit/multi/http/wp_bricks_builder_rce
- exploit/multi/http/wp_catch_themes_demo_import
- exploit/multi/http/wp_crop_rce
- exploit/multi/http/wp_db_backup_rce
- exploit/multi/http/wp_dnd_mul_file_rce
- exploit/multi/http/wp_file_manager_rce
- exploit/multi/http/wp_givewp_rce
- exploit/multi/http/wp_hash_form_rce
- exploit/multi/http/wp_litespeed_cookie_theft
- exploit/multi/http/wp_ninja_forms_unauthenticated_file_upload
- exploit/multi/http/wp_plugin_backup_guard_rce
- exploit/multi/http/wp_plugin_elementor_auth_upload_rce
- exploit/multi/http/wp_plugin_fma_shortcode_unauth_rce
- exploit/multi/http/wp_plugin_modern_events_calendar_rce
- exploit/multi/http/wp_plugin_sp_project_document_rce
- exploit/multi/http/wp_popular_posts_rce
- exploit/multi/http/wp_responsive_thumbnail_slider_upload
- exploit/multi/http/wp_royal_elementor_addons_rce
- exploit/multi/http/wp_simple_file_list_rce
- exploit/multi/http/wso2_file_upload_rce
- exploit/multi/http/x7chat2_php_exec
- exploit/multi/http/zabbix_script_exec
- exploit/multi/http/zemra_panel_rce
- exploit/multi/http/zenworks_configuration_management_upload
- exploit/multi/http/zenworks_control_center_upload
- exploit/multi/http/zpanel_information_disclosure_rce
- ids (1)
- iiop (1)
- kubernetes (1)
- local (5)
- misc (46)
- exploit/multi/misc/apache_activemq_rce_cve_2023_46604
- exploit/multi/misc/arkeia_agent_exec
- exploit/multi/misc/batik_svg_java
- exploit/multi/misc/bmc_patrol_cmd_exec
- exploit/multi/misc/bmc_server_automation_rscd_nsh_rce
- exploit/multi/misc/calibre_exec
- exploit/multi/misc/claymore_dual_miner_remote_manager_rce
- exploit/multi/misc/consul_rexec_exec
- exploit/multi/misc/consul_service_exec
- exploit/multi/misc/erlang_cookie_rce
- exploit/multi/misc/freeswitch_event_socket_cmd_exec
- exploit/multi/misc/hp_data_protector_exec_integutil
- exploit/multi/misc/hp_vsa_exec
- exploit/multi/misc/ibm_tm1_unauth_rce
- exploit/multi/misc/indesign_server_soap
- exploit/multi/misc/java_jdwp_debugger
- exploit/multi/misc/java_jmx_server
- exploit/multi/misc/java_rmi_server
- exploit/multi/misc/jboss_remoting_unified_invoker_rce
- exploit/multi/misc/legend_bot_exec
- exploit/multi/misc/msf_rpc_console
- exploit/multi/misc/msfd_rce_remote
- exploit/multi/misc/nodejs_v8_debugger
- exploit/multi/misc/nomad_exec
- exploit/multi/misc/openoffice_document_macro
- exploit/multi/misc/openview_omniback_exec
- exploit/multi/misc/osgi_console_exec
- exploit/multi/misc/pbot_exec
- exploit/multi/misc/persistent_hpca_radexec_exec
- exploit/multi/misc/qemu_monitor_hmp_migrate_cmd_exec
- exploit/multi/misc/ra1nx_pubcall_exec
- exploit/multi/misc/teamcity_agent_xmlrpc_exec
- exploit/multi/misc/veritas_netbackup_cmdexec
- exploit/multi/misc/vscode_ipynb_remote_dev_exec
- exploit/multi/misc/w3tw0rk_exec
- exploit/multi/misc/weblogic_deserialize
- exploit/multi/misc/weblogic_deserialize_asyncresponseservice
- exploit/multi/misc/weblogic_deserialize_badattr_extcomp
- exploit/multi/misc/weblogic_deserialize_badattrval
- exploit/multi/misc/weblogic_deserialize_marshalledobject
- exploit/multi/misc/weblogic_deserialize_rawobject
- exploit/multi/misc/weblogic_deserialize_unicastref
- exploit/multi/misc/wireshark_lwres_getaddrbyname
- exploit/multi/misc/wireshark_lwres_getaddrbyname_loop
- exploit/multi/misc/xdh_x_exec
- exploit/multi/misc/zend_java_bridge
- mysql (1)
- ntp (1)
- php (4)
- postgres (2)
- realserver (1)
- samba (2)
- sap (4)
- scada (1)
- script (1)
- ssh (1)
- svn (1)
- upnp (1)
- veritas (1)
- vnc (1)
- vpn (1)
- wyse (1)
- exploit/multi/handler
- netware (2)
- openbsd (1)
- osx (40)
- afp (1)
- arkeia (1)
- browser (10)
- exploit/osx/browser/adobe_flash_delete_range_tl_op
- exploit/osx/browser/mozilla_mchannel
- exploit/osx/browser/osx_gatekeeper_bypass
- exploit/osx/browser/safari_file_policy
- exploit/osx/browser/safari_in_operator_side_effect
- exploit/osx/browser/safari_metadata_archive
- exploit/osx/browser/safari_proxy_object_type_confusion
- exploit/osx/browser/safari_user_assisted_applescript_exec
- exploit/osx/browser/safari_user_assisted_download_launch
- exploit/osx/browser/software_update
- email (1)
- ftp (1)
- http (1)
- local (20)
- exploit/osx/local/acronis_trueimage_xpc_privesc
- exploit/osx/local/cfprefsd_race_condition
- exploit/osx/local/dyld_print_to_file_root
- exploit/osx/local/feedback_assistant_root
- exploit/osx/local/iokit_keyboard_root
- exploit/osx/local/libxpc_mitm_ssudo
- exploit/osx/local/mac_dirty_cow
- exploit/osx/local/nfs_mount_root
- exploit/osx/local/persistence
- exploit/osx/local/root_no_password
- exploit/osx/local/rootpipe
- exploit/osx/local/rootpipe_entitlements
- exploit/osx/local/rsh_libmalloc
- exploit/osx/local/setuid_tunnelblick
- exploit/osx/local/setuid_viscosity
- exploit/osx/local/sudo_password_bypass
- exploit/osx/local/timemachine_cmd_injection
- exploit/osx/local/tpwn
- exploit/osx/local/vmware_bash_function_root
- exploit/osx/local/vmware_fusion_lpe
- mdns (1)
- misc (1)
- rtsp (1)
- samba (2)
- qnx (2)
- solaris (14)
- unix (220)
- dhcp (2)
- fileformat (5)
- ftp (3)
- http (29)
- exploit/unix/http/cacti_filter_sqli_rce
- exploit/unix/http/contentkeeperweb_mimencode
- exploit/unix/http/ctek_skyrouter
- exploit/unix/http/dell_kace_k1000_upload
- exploit/unix/http/epmp1000_get_chart_cmd_shell
- exploit/unix/http/epmp1000_ping_cmd_shell
- exploit/unix/http/freepbx_callmenum
- exploit/unix/http/laravel_token_unserialize_exec
- exploit/unix/http/lifesize_room
- exploit/unix/http/maltrail_rce
- exploit/unix/http/pfsense_clickjacking
- exploit/unix/http/pfsense_config_data_exec
- exploit/unix/http/pfsense_diag_routes_webshell
- exploit/unix/http/pfsense_graph_injection_exec
- exploit/unix/http/pfsense_group_member_exec
- exploit/unix/http/pfsense_pfblockerng_webshell
- exploit/unix/http/pihole_blocklist_exec
- exploit/unix/http/pihole_dhcp_mac_exec
- exploit/unix/http/pihole_whitelist_exec
- exploit/unix/http/quest_kace_systems_management_rce
- exploit/unix/http/raspap_rce
- exploit/unix/http/schneider_electric_net55xx_encoder
- exploit/unix/http/splunk_xslt_authenticated_rce
- exploit/unix/http/syncovery_linux_rce_2022_36534
- exploit/unix/http/tnftp_savefile
- exploit/unix/http/twiki_debug_plugins
- exploit/unix/http/vmturbo_vmtadmin_exec_noauth
- exploit/unix/http/xdebug_unauth_exec
- exploit/unix/http/zivif_ipcheck_exec
- irc (1)
- local (7)
- misc (6)
- smtp (5)
- sonicwall (1)
- ssh (3)
- webapp (157)
- exploit/unix/webapp/actualanalyzer_ant_cookie_exec
- exploit/unix/webapp/aerohive_netconfig_lfi_log_poison_rce
- exploit/unix/webapp/ajenti_auth_username_cmd_injection
- exploit/unix/webapp/arkeia_upload_exec
- exploit/unix/webapp/awstats_configdir_exec
- exploit/unix/webapp/awstats_migrate_exec
- exploit/unix/webapp/awstatstotals_multisort
- exploit/unix/webapp/barracuda_img_exec
- exploit/unix/webapp/base_qry_common
- exploit/unix/webapp/basilic_diff_exec
- exploit/unix/webapp/bolt_authenticated_rce
- exploit/unix/webapp/cacti_graphimage_exec
- exploit/unix/webapp/cakephp_cache_corruption
- exploit/unix/webapp/carberp_backdoor_exec
- exploit/unix/webapp/citrix_access_gateway_exec
- exploit/unix/webapp/clipbucket_upload_exec
- exploit/unix/webapp/coppermine_piceditor
- exploit/unix/webapp/datalife_preview_exec
- exploit/unix/webapp/dogfood_spell_exec
- exploit/unix/webapp/drupal_coder_exec
- exploit/unix/webapp/drupal_drupalgeddon2
- exploit/unix/webapp/drupal_restws_exec
- exploit/unix/webapp/drupal_restws_unserialize
- exploit/unix/webapp/egallery_upload_exec
- exploit/unix/webapp/elfinder_php_connector_exiftran_cmd_injection
- exploit/unix/webapp/flashchat_upload_exec
- exploit/unix/webapp/foswiki_maketext
- exploit/unix/webapp/freepbx_config_exec
- exploit/unix/webapp/fusionpbx_exec_cmd_exec
- exploit/unix/webapp/fusionpbx_operator_panel_exec_cmd_exec
- exploit/unix/webapp/generic_exec
- exploit/unix/webapp/get_simple_cms_upload_exec
- exploit/unix/webapp/google_proxystylesheet_exec
- exploit/unix/webapp/graphite_pickle_exec
- exploit/unix/webapp/guestbook_ssi_exec
- exploit/unix/webapp/hastymail_exec
- exploit/unix/webapp/havalite_upload_exec
- exploit/unix/webapp/horde_unserialize_exec
- exploit/unix/webapp/hybridauth_install_php_exec
- exploit/unix/webapp/instantcms_exec
- exploit/unix/webapp/invision_pboard_unserialize_exec
- exploit/unix/webapp/joomla_akeeba_unserialize
- exploit/unix/webapp/joomla_comfields_sqli_rce
- exploit/unix/webapp/joomla_comjce_imgmanager
- exploit/unix/webapp/joomla_contenthistory_sqli_rce
- exploit/unix/webapp/joomla_media_upload_exec
- exploit/unix/webapp/joomla_tinybrowser
- exploit/unix/webapp/jquery_file_upload
- exploit/unix/webapp/kimai_sqli
- exploit/unix/webapp/libretto_upload_exec
- exploit/unix/webapp/maarch_letterbox_file_upload
- exploit/unix/webapp/mambo_cache_lite
- exploit/unix/webapp/mitel_awc_exec
- exploit/unix/webapp/moinmoin_twikidraw
- exploit/unix/webapp/mybb_backdoor
- exploit/unix/webapp/nagios3_history_cgi
- exploit/unix/webapp/nagios3_statuswml_ping
- exploit/unix/webapp/nagios_graph_explorer
- exploit/unix/webapp/narcissus_backend_exec
- exploit/unix/webapp/open_flash_chart_upload_exec
- exploit/unix/webapp/openemr_sqli_privesc_upload
- exploit/unix/webapp/openemr_upload_exec
- exploit/unix/webapp/openmediavault_auth_cron_rce
- exploit/unix/webapp/openmediavault_rpc_rce
- exploit/unix/webapp/opennetadmin_ping_cmd_injection
- exploit/unix/webapp/opensis_chain_exec
- exploit/unix/webapp/opensis_modname_exec
- exploit/unix/webapp/openview_connectednodes_exec
- exploit/unix/webapp/openx_banner_edit
- exploit/unix/webapp/oracle_vm_agent_utl
- exploit/unix/webapp/oscommerce_filemanager
- exploit/unix/webapp/pajax_remote_exec
- exploit/unix/webapp/php_charts_exec
- exploit/unix/webapp/php_eval
- exploit/unix/webapp/php_include
- exploit/unix/webapp/php_vbulletin_template
- exploit/unix/webapp/php_xmlrpc_eval
- exploit/unix/webapp/phpbb_highlight
- exploit/unix/webapp/phpcollab_upload_exec
- exploit/unix/webapp/phpmyadmin_config
- exploit/unix/webapp/piwik_superuser_plugin_upload
- exploit/unix/webapp/projectpier_upload_exec
- exploit/unix/webapp/projectsend_upload_exec
- exploit/unix/webapp/qtss_parse_xml_exec
- exploit/unix/webapp/rconfig_install_cmd_exec
- exploit/unix/webapp/redmine_scm_exec
- exploit/unix/webapp/seportal_sqli_exec
- exploit/unix/webapp/simple_e_document_upload_exec
- exploit/unix/webapp/sixapart_movabletype_storable_exec
- exploit/unix/webapp/skybluecanvas_exec
- exploit/unix/webapp/sphpblog_file_upload
- exploit/unix/webapp/squash_yaml_exec
- exploit/unix/webapp/squirrelmail_pgp_plugin
- exploit/unix/webapp/sugarcrm_rest_unserialize_exec
- exploit/unix/webapp/sugarcrm_unserialize_exec
- exploit/unix/webapp/thinkphp_rce
- exploit/unix/webapp/tikiwiki_graph_formula_exec
- exploit/unix/webapp/tikiwiki_jhot_exec
- exploit/unix/webapp/tikiwiki_unserialize_exec
- exploit/unix/webapp/tikiwiki_upload_exec
- exploit/unix/webapp/trixbox_ce_endpoint_devicemap_rce
- exploit/unix/webapp/trixbox_langchoice
- exploit/unix/webapp/tuleap_rest_unserialize_exec
- exploit/unix/webapp/tuleap_unserialize_exec
- exploit/unix/webapp/twiki_history
- exploit/unix/webapp/twiki_maketext
- exploit/unix/webapp/twiki_search
- exploit/unix/webapp/vbulletin_vote_sqli_exec
- exploit/unix/webapp/vicidial_agent_authenticated_rce
- exploit/unix/webapp/vicidial_manager_send_cmd_exec
- exploit/unix/webapp/vicidial_user_authorization_unauth_cmd_exec
- exploit/unix/webapp/webmin_show_cgi_exec
- exploit/unix/webapp/webmin_upload_exec
- exploit/unix/webapp/webtester_exec
- exploit/unix/webapp/wp_admin_shell_upload
- exploit/unix/webapp/wp_advanced_custom_fields_exec
- exploit/unix/webapp/wp_ajax_load_more_file_upload
- exploit/unix/webapp/wp_asset_manager_upload_exec
- exploit/unix/webapp/wp_creativecontactform_file_upload
- exploit/unix/webapp/wp_downloadmanager_upload
- exploit/unix/webapp/wp_easycart_unrestricted_file_upload
- exploit/unix/webapp/wp_foxypress_upload
- exploit/unix/webapp/wp_frontend_editor_file_upload
- exploit/unix/webapp/wp_google_document_embedder_exec
- exploit/unix/webapp/wp_holding_pattern_file_upload
- exploit/unix/webapp/wp_inboundio_marketing_file_upload
- exploit/unix/webapp/wp_infinitewp_auth_bypass
- exploit/unix/webapp/wp_infusionsoft_upload
- exploit/unix/webapp/wp_lastpost_exec
- exploit/unix/webapp/wp_mobile_detector_upload_execute
- exploit/unix/webapp/wp_nmediawebsite_file_upload
- exploit/unix/webapp/wp_optimizepress_upload
- exploit/unix/webapp/wp_photo_gallery_unrestricted_file_upload
- exploit/unix/webapp/wp_phpmailer_host_header
- exploit/unix/webapp/wp_pie_register_bypass_rce
- exploit/unix/webapp/wp_pixabay_images_upload
- exploit/unix/webapp/wp_plainview_activity_monitor_rce
- exploit/unix/webapp/wp_platform_exec
- exploit/unix/webapp/wp_property_upload_exec
- exploit/unix/webapp/wp_reflexgallery_file_upload
- exploit/unix/webapp/wp_revslider_upload_execute
- exploit/unix/webapp/wp_slideshowgallery_upload
- exploit/unix/webapp/wp_symposium_shell_upload
- exploit/unix/webapp/wp_total_cache_exec
- exploit/unix/webapp/wp_worktheflow_upload
- exploit/unix/webapp/wp_wpdiscuz_unauthenticated_file_upload
- exploit/unix/webapp/wp_wpshop_ecommerce_file_upload
- exploit/unix/webapp/wp_wptouch_file_upload
- exploit/unix/webapp/wp_wysija_newsletters_upload
- exploit/unix/webapp/xoda_file_upload
- exploit/unix/webapp/xymon_useradm_cmd_exec
- exploit/unix/webapp/zeroshell_exec
- exploit/unix/webapp/zimbra_lfi
- exploit/unix/webapp/zoneminder_lang_exec
- exploit/unix/webapp/zoneminder_packagecontrol_exec
- exploit/unix/webapp/zoneminder_snapshots
- exploit/unix/webapp/zpanel_username_exec
- x11 (1)
- windows (1193)
- antivirus (9)
- exploit/windows/antivirus/ams_hndlrsvc
- exploit/windows/antivirus/ams_xfr
- exploit/windows/antivirus/symantec_endpoint_manager_rce
- exploit/windows/antivirus/symantec_iao
- exploit/windows/antivirus/symantec_rtvscan
- exploit/windows/antivirus/symantec_workspace_streaming_exec
- exploit/windows/antivirus/trendmicro_serverprotect
- exploit/windows/antivirus/trendmicro_serverprotect_createbinding
- exploit/windows/antivirus/trendmicro_serverprotect_earthagent
- arkeia (1)
- backdoor (1)
- backupexec (3)
- brightstor (19)
- exploit/windows/brightstor/ca_arcserve_342
- exploit/windows/brightstor/discovery_tcp
- exploit/windows/brightstor/discovery_udp
- exploit/windows/brightstor/etrust_itm_alert
- exploit/windows/brightstor/hsmserver
- exploit/windows/brightstor/lgserver
- exploit/windows/brightstor/lgserver_multi
- exploit/windows/brightstor/lgserver_rxrlogin
- exploit/windows/brightstor/lgserver_rxssetdatagrowthscheduleandfilter
- exploit/windows/brightstor/lgserver_rxsuselicenseini
- exploit/windows/brightstor/license_gcr
- exploit/windows/brightstor/mediasrv_sunrpc
- exploit/windows/brightstor/message_engine
- exploit/windows/brightstor/message_engine_72
- exploit/windows/brightstor/message_engine_heap
- exploit/windows/brightstor/sql_agent
- exploit/windows/brightstor/tape_engine
- exploit/windows/brightstor/tape_engine_0x8a
- exploit/windows/brightstor/universal_agent
- browser (246)
- exploit/windows/browser/adobe_cooltype_sing
- exploit/windows/browser/adobe_flash_avm2
- exploit/windows/browser/adobe_flash_casi32_int_overflow
- exploit/windows/browser/adobe_flash_copy_pixels_to_byte_array
- exploit/windows/browser/adobe_flash_domain_memory_uaf
- exploit/windows/browser/adobe_flash_filters_type_confusion
- exploit/windows/browser/adobe_flash_mp4_cprt
- exploit/windows/browser/adobe_flash_otf_font
- exploit/windows/browser/adobe_flash_pcre
- exploit/windows/browser/adobe_flash_regex_value
- exploit/windows/browser/adobe_flash_rtmp
- exploit/windows/browser/adobe_flash_sps
- exploit/windows/browser/adobe_flash_uncompress_zlib_uninitialized
- exploit/windows/browser/adobe_flash_worker_byte_array_uaf
- exploit/windows/browser/adobe_flashplayer_arrayindexing
- exploit/windows/browser/adobe_flashplayer_avm
- exploit/windows/browser/adobe_flashplayer_flash10o
- exploit/windows/browser/adobe_flashplayer_newfunction
- exploit/windows/browser/adobe_flatedecode_predictor02
- exploit/windows/browser/adobe_geticon
- exploit/windows/browser/adobe_jbig2decode
- exploit/windows/browser/adobe_media_newplayer
- exploit/windows/browser/adobe_shockwave_rcsl_corruption
- exploit/windows/browser/adobe_toolbutton
- exploit/windows/browser/adobe_utilprintf
- exploit/windows/browser/advantech_webaccess_dvs_getcolor
- exploit/windows/browser/aim_goaway
- exploit/windows/browser/aladdin_choosefilepath_bof
- exploit/windows/browser/amaya_bdo
- exploit/windows/browser/aol_ampx_convertfile
- exploit/windows/browser/aol_icq_downloadagent
- exploit/windows/browser/apple_itunes_playlist
- exploit/windows/browser/apple_quicktime_marshaled_punk
- exploit/windows/browser/apple_quicktime_mime_type
- exploit/windows/browser/apple_quicktime_rdrf
- exploit/windows/browser/apple_quicktime_rtsp
- exploit/windows/browser/apple_quicktime_smil_debug
- exploit/windows/browser/apple_quicktime_texml_font_table
- exploit/windows/browser/ask_shortformat
- exploit/windows/browser/asus_net4switch_ipswcom
- exploit/windows/browser/athocgov_completeinstallation
- exploit/windows/browser/autodesk_idrop
- exploit/windows/browser/aventail_epi_activex
- exploit/windows/browser/awingsoft_web3d_bof
- exploit/windows/browser/awingsoft_winds3d_sceneurl
- exploit/windows/browser/baofeng_storm_onbeforevideodownload
- exploit/windows/browser/barcode_ax49
- exploit/windows/browser/blackice_downloadimagefileurl
- exploit/windows/browser/c6_messenger_downloaderactivex
- exploit/windows/browser/ca_brightstor_addcolumn
- exploit/windows/browser/chilkat_crypt_writefile
- exploit/windows/browser/chrome_filereader_uaf
- exploit/windows/browser/cisco_anyconnect_exec
- exploit/windows/browser/cisco_playerpt_setsource
- exploit/windows/browser/cisco_playerpt_setsource_surl
- exploit/windows/browser/cisco_webex_ext
- exploit/windows/browser/citrix_gateway_actx
- exploit/windows/browser/clear_quest_cqole
- exploit/windows/browser/communicrypt_mail_activex
- exploit/windows/browser/creative_software_cachefolder
- exploit/windows/browser/crystal_reports_printcontrol
- exploit/windows/browser/dell_webcam_crazytalk
- exploit/windows/browser/dxstudio_player_exec
- exploit/windows/browser/ea_checkrequirements
- exploit/windows/browser/ebook_flipviewer_fviewerloading
- exploit/windows/browser/enjoysapgui_comp_download
- exploit/windows/browser/enjoysapgui_preparetoposthtml
- exploit/windows/browser/exodus
- exploit/windows/browser/facebook_extractiptc
- exploit/windows/browser/firefox_smil_uaf
- exploit/windows/browser/foxit_reader_plugin_url_bof
- exploit/windows/browser/getgodm_http_response_bof
- exploit/windows/browser/gom_openurl
- exploit/windows/browser/greendam_url
- exploit/windows/browser/honeywell_hscremotedeploy_exec
- exploit/windows/browser/honeywell_tema_exec
- exploit/windows/browser/hp_alm_xgo_setshapenodetype_exec
- exploit/windows/browser/hp_easy_printer_care_xmlcachemgr
- exploit/windows/browser/hp_easy_printer_care_xmlsimpleaccessor
- exploit/windows/browser/hp_loadrunner_addfile
- exploit/windows/browser/hp_loadrunner_addfolder
- exploit/windows/browser/hp_loadrunner_writefilebinary
- exploit/windows/browser/hp_loadrunner_writefilestring
- exploit/windows/browser/hpmqc_progcolor
- exploit/windows/browser/hyleos_chemviewx_activex
- exploit/windows/browser/ibm_spss_c1sizer
- exploit/windows/browser/ibm_tivoli_pme_activex_bof
- exploit/windows/browser/ibmegath_getxmlvalue
- exploit/windows/browser/ibmlotusdomino_dwa_uploadmodule
- exploit/windows/browser/ie_cbutton_uaf
- exploit/windows/browser/ie_cgenericelement_uaf
- exploit/windows/browser/ie_createobject
- exploit/windows/browser/ie_execcommand_uaf
- exploit/windows/browser/ie_iscomponentinstalled
- exploit/windows/browser/ie_setmousecapture_uaf
- exploit/windows/browser/ie_unsafe_scripting
- exploit/windows/browser/imgeviewer_tifmergemultifiles
- exploit/windows/browser/indusoft_issymbol_internationalseparator
- exploit/windows/browser/inotes_dwa85w_bof
- exploit/windows/browser/intrust_annotatex_add
- exploit/windows/browser/java_basicservice_impl
- exploit/windows/browser/java_cmm
- exploit/windows/browser/java_codebase_trust
- exploit/windows/browser/java_docbase_bof
- exploit/windows/browser/java_mixer_sequencer
- exploit/windows/browser/java_ws_arginject_altjvm
- exploit/windows/browser/java_ws_double_quote
- exploit/windows/browser/java_ws_vmargs
- exploit/windows/browser/juniper_sslvpn_ive_setupdll
- exploit/windows/browser/kazaa_altnet_heap
- exploit/windows/browser/keyhelp_launchtripane_exec
- exploit/windows/browser/logitechvideocall_start
- exploit/windows/browser/lpviewer_url
- exploit/windows/browser/macrovision_downloadandexecute
- exploit/windows/browser/macrovision_unsafe
- exploit/windows/browser/malwarebytes_update_exec
- exploit/windows/browser/maxthon_history_xcs
- exploit/windows/browser/mcafee_mcsubmgr_vsprintf
- exploit/windows/browser/mcafee_mvt_exec
- exploit/windows/browser/mcafeevisualtrace_tracetarget
- exploit/windows/browser/mirc_irc_url
- exploit/windows/browser/mozilla_attribchildremoved
- exploit/windows/browser/mozilla_firefox_onreadystatechange
- exploit/windows/browser/mozilla_firefox_xmlserializer
- exploit/windows/browser/mozilla_interleaved_write
- exploit/windows/browser/mozilla_mchannel
- exploit/windows/browser/mozilla_nssvgvalue
- exploit/windows/browser/mozilla_nstreerange
- exploit/windows/browser/mozilla_reduceright
- exploit/windows/browser/ms03_020_ie_objecttype
- exploit/windows/browser/ms05_054_onload
- exploit/windows/browser/ms06_001_wmf_setabortproc
- exploit/windows/browser/ms06_013_createtextrange
- exploit/windows/browser/ms06_055_vml_method
- exploit/windows/browser/ms06_057_webview_setslice
- exploit/windows/browser/ms06_067_keyframe
- exploit/windows/browser/ms06_071_xml_core
- exploit/windows/browser/ms07_017_ani_loadimage_chunksize
- exploit/windows/browser/ms08_041_snapshotviewer
- exploit/windows/browser/ms08_053_mediaencoder
- exploit/windows/browser/ms08_070_visual_studio_msmask
- exploit/windows/browser/ms08_078_xml_corruption
- exploit/windows/browser/ms09_002_memory_corruption
- exploit/windows/browser/ms09_043_owc_htmlurl
- exploit/windows/browser/ms09_043_owc_msdso
- exploit/windows/browser/ms09_072_style_object
- exploit/windows/browser/ms10_002_aurora
- exploit/windows/browser/ms10_002_ie_object
- exploit/windows/browser/ms10_018_ie_behaviors
- exploit/windows/browser/ms10_018_ie_tabular_activex
- exploit/windows/browser/ms10_022_ie_vbscript_winhlp32
- exploit/windows/browser/ms10_026_avi_nsamplespersec
- exploit/windows/browser/ms10_042_helpctr_xss_cmd_exec
- exploit/windows/browser/ms10_046_shortcut_icon_dllloader
- exploit/windows/browser/ms10_090_ie_css_clip
- exploit/windows/browser/ms11_003_ie_css_import
- exploit/windows/browser/ms11_050_mshtml_cobjectelement
- exploit/windows/browser/ms11_081_option
- exploit/windows/browser/ms11_093_ole32
- exploit/windows/browser/ms12_004_midi
- exploit/windows/browser/ms12_037_ie_colspan
- exploit/windows/browser/ms12_037_same_id
- exploit/windows/browser/ms13_009_ie_slayoutrun_uaf
- exploit/windows/browser/ms13_022_silverlight_script_object
- exploit/windows/browser/ms13_037_svg_dashstyle
- exploit/windows/browser/ms13_055_canchor
- exploit/windows/browser/ms13_059_cflatmarkuppointer
- exploit/windows/browser/ms13_069_caret
- exploit/windows/browser/ms13_080_cdisplaypointer
- exploit/windows/browser/ms13_090_cardspacesigninhelper
- exploit/windows/browser/ms14_012_cmarkup_uaf
- exploit/windows/browser/ms14_012_textrange
- exploit/windows/browser/ms14_064_ole_code_execution
- exploit/windows/browser/ms16_051_vbscript
- exploit/windows/browser/msvidctl_mpeg2
- exploit/windows/browser/mswhale_checkforupdates
- exploit/windows/browser/msxml_get_definition_code_exec
- exploit/windows/browser/nctaudiofile2_setformatlikesample
- exploit/windows/browser/nis2004_antispam
- exploit/windows/browser/nis2004_get
- exploit/windows/browser/notes_handler_cmdinject
- exploit/windows/browser/novell_groupwise_gwcls1_actvx
- exploit/windows/browser/novelliprint_callbackurl
- exploit/windows/browser/novelliprint_datetime
- exploit/windows/browser/novelliprint_executerequest
- exploit/windows/browser/novelliprint_executerequest_dbg
- exploit/windows/browser/novelliprint_getdriversettings
- exploit/windows/browser/novelliprint_getdriversettings_2
- exploit/windows/browser/novelliprint_target_frame
- exploit/windows/browser/ntr_activex_check_bof
- exploit/windows/browser/ntr_activex_stopmodule
- exploit/windows/browser/oracle_autovue_setmarkupmode
- exploit/windows/browser/oracle_dc_submittoexpress
- exploit/windows/browser/oracle_webcenter_checkoutandopen
- exploit/windows/browser/orbit_connecting
- exploit/windows/browser/ovftool_format_string
- exploit/windows/browser/pcvue_func
- exploit/windows/browser/persits_xupload_traversal
- exploit/windows/browser/quickr_qp2_bof
- exploit/windows/browser/real_arcade_installerdlg
- exploit/windows/browser/realplayer_cdda_uri
- exploit/windows/browser/realplayer_console
- exploit/windows/browser/realplayer_import
- exploit/windows/browser/realplayer_qcp
- exploit/windows/browser/realplayer_smil
- exploit/windows/browser/roxio_cineplayer
- exploit/windows/browser/safari_xslt_output
- exploit/windows/browser/samsung_neti_wiewer_backuptoavi_bof
- exploit/windows/browser/samsung_security_manager_put
- exploit/windows/browser/sapgui_saveviewtosessionfile
- exploit/windows/browser/siemens_solid_edge_selistctrlx
- exploit/windows/browser/softartisans_getdrivename
- exploit/windows/browser/sonicwall_addrouteentry
- exploit/windows/browser/symantec_altirisdeployment_downloadandinstall
- exploit/windows/browser/symantec_altirisdeployment_runcmd
- exploit/windows/browser/symantec_appstream_unsafe
- exploit/windows/browser/symantec_backupexec_pvcalendar
- exploit/windows/browser/symantec_consoleutilities_browseandsavefile
- exploit/windows/browser/synactis_connecttosynactis_bof
- exploit/windows/browser/systemrequirementslab_unsafe
- exploit/windows/browser/teechart_pro
- exploit/windows/browser/tom_sawyer_tsgetx71ex552
- exploit/windows/browser/trendmicro_extsetowner
- exploit/windows/browser/trendmicro_officescan
- exploit/windows/browser/tumbleweed_filetransfer
- exploit/windows/browser/ubisoft_uplay_cmd_exec
- exploit/windows/browser/ultramjcam_openfiledig_bof
- exploit/windows/browser/ultraoffice_httpupload
- exploit/windows/browser/verypdf_pdfview
- exploit/windows/browser/viscom_movieplayer_drawtext
- exploit/windows/browser/vlc_amv
- exploit/windows/browser/vlc_mms_bof
- exploit/windows/browser/webdav_dll_hijacker
- exploit/windows/browser/webex_ucf_newobject
- exploit/windows/browser/wellintech_kingscada_kxclientdownload
- exploit/windows/browser/winamp_playlist_unc
- exploit/windows/browser/winamp_ultravox
- exploit/windows/browser/windvd7_applicationtype
- exploit/windows/browser/winzip_fileview
- exploit/windows/browser/wmi_admintools
- exploit/windows/browser/x360_video_player_set_text_bof
- exploit/windows/browser/xmplay_asx
- exploit/windows/browser/yahoomessenger_fvcom
- exploit/windows/browser/yahoomessenger_server
- exploit/windows/browser/zenturiprogramchecker_unsafe
- exploit/windows/browser/zenworks_helplauncher_exec
- dcerpc (5)
- email (3)
- emc (4)
- fileformat (189)
- exploit/windows/fileformat/a_pdf_wav_to_mp3
- exploit/windows/fileformat/abbs_amp_lst
- exploit/windows/fileformat/acdsee_fotoslate_string
- exploit/windows/fileformat/acdsee_xpm
- exploit/windows/fileformat/actfax_import_users_bof
- exploit/windows/fileformat/activepdf_webgrabber
- exploit/windows/fileformat/adobe_collectemailinfo
- exploit/windows/fileformat/adobe_cooltype_sing
- exploit/windows/fileformat/adobe_flashplayer_button
- exploit/windows/fileformat/adobe_flashplayer_newfunction
- exploit/windows/fileformat/adobe_flatedecode_predictor02
- exploit/windows/fileformat/adobe_geticon
- exploit/windows/fileformat/adobe_illustrator_v14_eps
- exploit/windows/fileformat/adobe_jbig2decode
- exploit/windows/fileformat/adobe_libtiff
- exploit/windows/fileformat/adobe_media_newplayer
- exploit/windows/fileformat/adobe_pdf_embedded_exe
- exploit/windows/fileformat/adobe_pdf_embedded_exe_nojs
- exploit/windows/fileformat/adobe_reader_u3d
- exploit/windows/fileformat/adobe_toolbutton
- exploit/windows/fileformat/adobe_u3d_meshdecl
- exploit/windows/fileformat/adobe_utilprintf
- exploit/windows/fileformat/allplayer_m3u_bof
- exploit/windows/fileformat/altap_salamander_pdb
- exploit/windows/fileformat/aol_desktop_linktag
- exploit/windows/fileformat/aol_phobos_bof
- exploit/windows/fileformat/apple_quicktime_pnsize
- exploit/windows/fileformat/apple_quicktime_rdrf
- exploit/windows/fileformat/apple_quicktime_texml
- exploit/windows/fileformat/audio_coder_m3u
- exploit/windows/fileformat/audio_wkstn_pls
- exploit/windows/fileformat/audiotran_pls
- exploit/windows/fileformat/audiotran_pls_1424
- exploit/windows/fileformat/aviosoft_plf_buf
- exploit/windows/fileformat/bacnet_csv
- exploit/windows/fileformat/beetel_netconfig_ini_bof
- exploit/windows/fileformat/blazedvd_hdtv_bof
- exploit/windows/fileformat/blazedvd_plf
- exploit/windows/fileformat/boxoft_wav_to_mp3
- exploit/windows/fileformat/bpftp_client_bps_bof
- exploit/windows/fileformat/bsplayer_m3u
- exploit/windows/fileformat/ca_cab
- exploit/windows/fileformat/cain_abel_4918_rdp
- exploit/windows/fileformat/ccmplayer_m3u_bof
- exploit/windows/fileformat/chasys_draw_ies_bmp_bof
- exploit/windows/fileformat/coolpdf_image_stream_bof
- exploit/windows/fileformat/corelpdf_fusion_bof
- exploit/windows/fileformat/csound_getnum_bof
- exploit/windows/fileformat/cutezip_bof
- exploit/windows/fileformat/cve_2017_8464_lnk_rce
- exploit/windows/fileformat/cyberlink_lpp_bof
- exploit/windows/fileformat/cyberlink_p2g_bof
- exploit/windows/fileformat/cytel_studio_cy3
- exploit/windows/fileformat/deepburner_path
- exploit/windows/fileformat/destinymediaplayer16
- exploit/windows/fileformat/digital_music_pad_pls
- exploit/windows/fileformat/djstudio_pls_bof
- exploit/windows/fileformat/djvu_imageurl
- exploit/windows/fileformat/documalis_pdf_editor_and_scanner
- exploit/windows/fileformat/dupscout_xml
- exploit/windows/fileformat/dvdx_plf_bof
- exploit/windows/fileformat/easycdda_pls_bof
- exploit/windows/fileformat/emc_appextender_keyworks
- exploit/windows/fileformat/erdas_er_viewer_bof
- exploit/windows/fileformat/erdas_er_viewer_rf_report_error
- exploit/windows/fileformat/esignal_styletemplate_bof
- exploit/windows/fileformat/etrust_pestscan
- exploit/windows/fileformat/ezip_wizard_bof
- exploit/windows/fileformat/fatplayer_wav
- exploit/windows/fileformat/fdm_torrent
- exploit/windows/fileformat/feeddemon_opml
- exploit/windows/fileformat/foxit_reader_filewrite
- exploit/windows/fileformat/foxit_reader_launch
- exploit/windows/fileformat/foxit_reader_uaf
- exploit/windows/fileformat/foxit_title_bof
- exploit/windows/fileformat/free_mp3_ripper_wav
- exploit/windows/fileformat/galan_fileformat_bof
- exploit/windows/fileformat/greenshot_deserialize_cve_2023_34634
- exploit/windows/fileformat/gsm_sim
- exploit/windows/fileformat/gta_samp
- exploit/windows/fileformat/hhw_hhp_compiledfile_bof
- exploit/windows/fileformat/hhw_hhp_contentfile_bof
- exploit/windows/fileformat/hhw_hhp_indexfile_bof
- exploit/windows/fileformat/homm3_h3m
- exploit/windows/fileformat/ht_mp3player_ht3_bof
- exploit/windows/fileformat/ibm_forms_viewer_fontname
- exploit/windows/fileformat/ibm_pcm_ws
- exploit/windows/fileformat/icofx_bof
- exploit/windows/fileformat/ideal_migration_ipj
- exploit/windows/fileformat/iftp_schedule_bof
- exploit/windows/fileformat/irfanview_jpeg2000_bof
- exploit/windows/fileformat/ispvm_xcf_ispxcf
- exploit/windows/fileformat/kingview_kingmess_kvl
- exploit/windows/fileformat/lattice_pac_bof
- exploit/windows/fileformat/lotusnotes_lzh
- exploit/windows/fileformat/magix_musikmaker_16_mmm
- exploit/windows/fileformat/mcafee_hercules_deletesnapshot
- exploit/windows/fileformat/mcafee_showreport_exec
- exploit/windows/fileformat/mediacoder_m3u
- exploit/windows/fileformat/mediajukebox
- exploit/windows/fileformat/microp_mppl
- exploit/windows/fileformat/microsoft_windows_contact
- exploit/windows/fileformat/millenium_mp3_pls
- exploit/windows/fileformat/mini_stream_pls_bof
- exploit/windows/fileformat/mjm_coreplayer2011_s3m
- exploit/windows/fileformat/mjm_quickplayer_s3m
- exploit/windows/fileformat/moxa_mediadbplayback
- exploit/windows/fileformat/mplayer_m3u_bof
- exploit/windows/fileformat/mplayer_sami_bof
- exploit/windows/fileformat/ms09_067_excel_featheader
- exploit/windows/fileformat/ms10_004_textbytesatom
- exploit/windows/fileformat/ms10_038_excel_obj_bof
- exploit/windows/fileformat/ms10_087_rtf_pfragments_bof
- exploit/windows/fileformat/ms11_006_createsizeddibsection
- exploit/windows/fileformat/ms11_021_xlb_bof
- exploit/windows/fileformat/ms12_005
- exploit/windows/fileformat/ms12_027_mscomctl_bof
- exploit/windows/fileformat/ms13_071_theme
- exploit/windows/fileformat/ms14_017_rtf
- exploit/windows/fileformat/ms14_060_sandworm
- exploit/windows/fileformat/ms14_064_packager_python
- exploit/windows/fileformat/ms14_064_packager_run_as_admin
- exploit/windows/fileformat/ms15_020_shortcut_icon_dllloader
- exploit/windows/fileformat/ms15_100_mcl_exe
- exploit/windows/fileformat/ms_visual_basic_vbp
- exploit/windows/fileformat/mswin_tiff_overflow
- exploit/windows/fileformat/msworks_wkspictureinterface
- exploit/windows/fileformat/mymp3player_m3u
- exploit/windows/fileformat/netop
- exploit/windows/fileformat/nitro_reader_jsapi
- exploit/windows/fileformat/nuance_pdf_launch_overflow
- exploit/windows/fileformat/office_dde_delivery
- exploit/windows/fileformat/office_excel_slk
- exploit/windows/fileformat/office_ms17_11882
- exploit/windows/fileformat/office_ole_multiple_dll_hijack
- exploit/windows/fileformat/office_word_hta
- exploit/windows/fileformat/openoffice_ole
- exploit/windows/fileformat/orbit_download_failed_bof
- exploit/windows/fileformat/orbital_viewer_orb
- exploit/windows/fileformat/ovf_format_string
- exploit/windows/fileformat/proshow_cellimage_bof
- exploit/windows/fileformat/proshow_load_bof
- exploit/windows/fileformat/publishit_pui
- exploit/windows/fileformat/real_networks_netzip_bof
- exploit/windows/fileformat/real_player_url_property_bof
- exploit/windows/fileformat/realplayer_ver_attribute_bof
- exploit/windows/fileformat/safenet_softremote_groupname
- exploit/windows/fileformat/sascam_get
- exploit/windows/fileformat/scadaphone_zip
- exploit/windows/fileformat/shadow_stream_recorder_bof
- exploit/windows/fileformat/shaper_pdf_bof
- exploit/windows/fileformat/somplplayer_m3u
- exploit/windows/fileformat/subtitle_processor_m3u_bof
- exploit/windows/fileformat/syncbreeze_xml
- exploit/windows/fileformat/tfm_mmplayer_m3u_ppl_bof
- exploit/windows/fileformat/theme_dll_hijack_cve_2023_38146
- exploit/windows/fileformat/total_video_player_ini_bof
- exploit/windows/fileformat/tugzip
- exploit/windows/fileformat/ultraiso_ccd
- exploit/windows/fileformat/ultraiso_cue
- exploit/windows/fileformat/ursoft_w32dasm
- exploit/windows/fileformat/varicad_dwb
- exploit/windows/fileformat/videocharge_studio
- exploit/windows/fileformat/videolan_tivo
- exploit/windows/fileformat/videospirit_visprj
- exploit/windows/fileformat/visio_dxf_bof
- exploit/windows/fileformat/visiwave_vwr_type
- exploit/windows/fileformat/vlc_mkv
- exploit/windows/fileformat/vlc_modplug_s3m
- exploit/windows/fileformat/vlc_realtext
- exploit/windows/fileformat/vlc_smb_uri
- exploit/windows/fileformat/vlc_webm
- exploit/windows/fileformat/vuplayer_cue
- exploit/windows/fileformat/vuplayer_m3u
- exploit/windows/fileformat/watermark_master
- exploit/windows/fileformat/winamp_maki_bof
- exploit/windows/fileformat/winrar_ace
- exploit/windows/fileformat/winrar_cve_2023_38831
- exploit/windows/fileformat/winrar_name_spoofing
- exploit/windows/fileformat/wireshark_mpeg_overflow
- exploit/windows/fileformat/wireshark_packet_dect
- exploit/windows/fileformat/wm_downloader_m3u
- exploit/windows/fileformat/word_msdtjs_rce
- exploit/windows/fileformat/word_mshtml_rce
- exploit/windows/fileformat/xenorate_xpl_bof
- exploit/windows/fileformat/xion_m3u_sehbof
- exploit/windows/fileformat/xradio_xrl_sehbof
- exploit/windows/fileformat/zahir_enterprise_plus_csv
- exploit/windows/fileformat/zinfaudioplayer221_pls
- firewall (2)
- ftp (65)
- exploit/windows/ftp/32bitftp_list_reply
- exploit/windows/ftp/3cdaemon_ftp_user
- exploit/windows/ftp/aasync_list_reply
- exploit/windows/ftp/ability_server_stor
- exploit/windows/ftp/absolute_ftp_list_bof
- exploit/windows/ftp/ayukov_nftp
- exploit/windows/ftp/bison_ftp_bof
- exploit/windows/ftp/cesarftp_mkd
- exploit/windows/ftp/comsnd_ftpd_fmtstr
- exploit/windows/ftp/dreamftp_format
- exploit/windows/ftp/easyfilesharing_pass
- exploit/windows/ftp/easyftp_cwd_fixret
- exploit/windows/ftp/easyftp_list_fixret
- exploit/windows/ftp/easyftp_mkd_fixret
- exploit/windows/ftp/filecopa_list_overflow
- exploit/windows/ftp/filewrangler_list_reply
- exploit/windows/ftp/freefloatftp_user
- exploit/windows/ftp/freefloatftp_wbem
- exploit/windows/ftp/freeftpd_pass
- exploit/windows/ftp/freeftpd_user
- exploit/windows/ftp/ftpgetter_pwd_reply
- exploit/windows/ftp/ftppad_list_reply
- exploit/windows/ftp/ftpshell51_pwd_reply
- exploit/windows/ftp/ftpshell_cli_bof
- exploit/windows/ftp/ftpsynch_list_reply
- exploit/windows/ftp/gekkomgr_list_reply
- exploit/windows/ftp/globalscapeftp_input
- exploit/windows/ftp/goldenftp_pass_bof
- exploit/windows/ftp/httpdx_tolog_format
- exploit/windows/ftp/kmftp_utility_cwd
- exploit/windows/ftp/labf_nfsaxe
- exploit/windows/ftp/leapftp_list_reply
- exploit/windows/ftp/leapftp_pasv_reply
- exploit/windows/ftp/ms09_053_ftpd_nlst
- exploit/windows/ftp/netterm_netftpd_user
- exploit/windows/ftp/odin_list_reply
- exploit/windows/ftp/open_ftpd_wbem
- exploit/windows/ftp/oracle9i_xdb_ftp_pass
- exploit/windows/ftp/oracle9i_xdb_ftp_unlock
- exploit/windows/ftp/pcman_put
- exploit/windows/ftp/pcman_stor
- exploit/windows/ftp/proftp_banner
- exploit/windows/ftp/quickshare_traversal_write
- exploit/windows/ftp/ricoh_dl_bof
- exploit/windows/ftp/sami_ftpd_list
- exploit/windows/ftp/sami_ftpd_user
- exploit/windows/ftp/sasser_ftpd_port
- exploit/windows/ftp/scriptftp_list
- exploit/windows/ftp/seagull_list_reply
- exploit/windows/ftp/servu_chmod
- exploit/windows/ftp/servu_mdtm
- exploit/windows/ftp/slimftpd_list_concat
- exploit/windows/ftp/trellian_client_pasv
- exploit/windows/ftp/turboftp_port
- exploit/windows/ftp/vermillion_ftpd_port
- exploit/windows/ftp/warftpd_165_pass
- exploit/windows/ftp/warftpd_165_user
- exploit/windows/ftp/wftpd_size
- exploit/windows/ftp/winaxe_server_ready
- exploit/windows/ftp/wing_ftp_admin_exec
- exploit/windows/ftp/wsftp_server_503_mkd
- exploit/windows/ftp/wsftp_server_505_xmd5
- exploit/windows/ftp/xftp_client_pwd
- exploit/windows/ftp/xlink_client
- exploit/windows/ftp/xlink_server
- games (3)
- http (219)
- exploit/windows/http/adobe_robohelper_authbypass
- exploit/windows/http/advantech_iview_networkservlet_cmd_inject
- exploit/windows/http/advantech_iview_unauth_rce
- exploit/windows/http/ajaxpro_deserialization_rce
- exploit/windows/http/altn_securitygateway
- exploit/windows/http/altn_webadmin
- exploit/windows/http/amlibweb_webquerydll_app
- exploit/windows/http/apache_activemq_traversal_upload
- exploit/windows/http/apache_chunked
- exploit/windows/http/apache_mod_rewrite_ldap
- exploit/windows/http/apache_modjk_overflow
- exploit/windows/http/apache_tika_jp2_jscript
- exploit/windows/http/avaya_ccr_imageupload_exec
- exploit/windows/http/badblue_ext_overflow
- exploit/windows/http/badblue_passthru
- exploit/windows/http/bea_weblogic_jsessionid
- exploit/windows/http/bea_weblogic_post_bof
- exploit/windows/http/bea_weblogic_transfer_encoding
- exploit/windows/http/belkin_bulldog
- exploit/windows/http/ca_arcserve_rpc_authbypass
- exploit/windows/http/ca_igateway_debug
- exploit/windows/http/ca_totaldefense_regeneratereports
- exploit/windows/http/cayin_xpost_sql_rce
- exploit/windows/http/cogent_datahub_command
- exploit/windows/http/cogent_datahub_request_headers_bof
- exploit/windows/http/coldfusion_fckeditor
- exploit/windows/http/cyclope_ess_sqli
- exploit/windows/http/desktopcentral_deserialization
- exploit/windows/http/desktopcentral_file_upload
- exploit/windows/http/desktopcentral_statusupdate_upload
- exploit/windows/http/disk_pulse_enterprise_bof
- exploit/windows/http/disk_pulse_enterprise_get
- exploit/windows/http/diskboss_get_bof
- exploit/windows/http/disksavvy_get_bof
- exploit/windows/http/disksorter_bof
- exploit/windows/http/dlink_central_wifimanager_rce
- exploit/windows/http/dnn_cookie_deserialization_rce
- exploit/windows/http/dup_scout_enterprise_login_bof
- exploit/windows/http/dupscts_bof
- exploit/windows/http/easychatserver_seh
- exploit/windows/http/easyfilesharing_post
- exploit/windows/http/easyfilesharing_seh
- exploit/windows/http/easyftp_list
- exploit/windows/http/edirectory_host
- exploit/windows/http/edirectory_imonitor
- exploit/windows/http/efs_easychatserver_username
- exploit/windows/http/efs_fmws_userid_bof
- exploit/windows/http/ektron_xslt_exec
- exploit/windows/http/ektron_xslt_exec_ws
- exploit/windows/http/ericom_access_now_bof
- exploit/windows/http/exchange_chainedserializationbinder_rce
- exploit/windows/http/exchange_ecp_dlp_policy
- exploit/windows/http/exchange_ecp_viewstate
- exploit/windows/http/exchange_proxylogon_rce
- exploit/windows/http/exchange_proxynotshell_rce
- exploit/windows/http/exchange_proxyshell_rce
- exploit/windows/http/ezserver_http
- exploit/windows/http/fdm_auth_header
- exploit/windows/http/file_sharing_wizard_seh
- exploit/windows/http/flexdotnetcms_upload_exec
- exploit/windows/http/forticlient_ems_fctid_sqli
- exploit/windows/http/fortilogger_arbitrary_fileupload
- exploit/windows/http/generic_http_dll_injection
- exploit/windows/http/geutebrueck_gcore_x64_rce_bo
- exploit/windows/http/git_lfs_rce
- exploit/windows/http/gitstack_rce
- exploit/windows/http/hp_autopass_license_traversal
- exploit/windows/http/hp_imc_bims_upload
- exploit/windows/http/hp_imc_java_deserialize
- exploit/windows/http/hp_imc_mibfileupload
- exploit/windows/http/hp_loadrunner_copyfiletoserver
- exploit/windows/http/hp_mpa_job_acct
- exploit/windows/http/hp_nnm_getnnmdata_hostname
- exploit/windows/http/hp_nnm_getnnmdata_icount
- exploit/windows/http/hp_nnm_getnnmdata_maxage
- exploit/windows/http/hp_nnm_nnmrptconfig_nameparams
- exploit/windows/http/hp_nnm_nnmrptconfig_schdparams
- exploit/windows/http/hp_nnm_openview5
- exploit/windows/http/hp_nnm_ovalarm_lang
- exploit/windows/http/hp_nnm_ovas
- exploit/windows/http/hp_nnm_ovbuildpath_textfile
- exploit/windows/http/hp_nnm_ovwebhelp
- exploit/windows/http/hp_nnm_ovwebsnmpsrv_main
- exploit/windows/http/hp_nnm_ovwebsnmpsrv_ovutil
- exploit/windows/http/hp_nnm_ovwebsnmpsrv_uro
- exploit/windows/http/hp_nnm_snmp
- exploit/windows/http/hp_nnm_snmpviewer_actapp
- exploit/windows/http/hp_nnm_toolbar_01
- exploit/windows/http/hp_nnm_toolbar_02
- exploit/windows/http/hp_nnm_webappmon_execvp
- exploit/windows/http/hp_nnm_webappmon_ovjavalocale
- exploit/windows/http/hp_openview_insight_backdoor
- exploit/windows/http/hp_pcm_snac_update_certificates
- exploit/windows/http/hp_pcm_snac_update_domain
- exploit/windows/http/hp_power_manager_filename
- exploit/windows/http/hp_power_manager_login
- exploit/windows/http/hp_sitescope_dns_tool
- exploit/windows/http/hp_sitescope_runomagentcommand
- exploit/windows/http/hpe_sim_76_amf_deserialization
- exploit/windows/http/httpdx_handlepeer
- exploit/windows/http/httpdx_tolog_format
- exploit/windows/http/ia_webmail
- exploit/windows/http/ibm_tivoli_endpoint_bof
- exploit/windows/http/ibm_tpmfosd_overflow
- exploit/windows/http/ibm_tsm_cad_header
- exploit/windows/http/icecast_header
- exploit/windows/http/integard_password_bof
- exploit/windows/http/intersystems_cache
- exploit/windows/http/intrasrv_bof
- exploit/windows/http/ipswitch_wug_maincfgret
- exploit/windows/http/ivanti_avalanche_filestoreconfig_upload
- exploit/windows/http/ivanti_epm_recordgoodapp_sqli_rce
- exploit/windows/http/jira_collector_traversal
- exploit/windows/http/kaseya_uploader
- exploit/windows/http/kaseya_uploadimage_file_upload
- exploit/windows/http/kentico_staging_syncserver
- exploit/windows/http/kolibri_http
- exploit/windows/http/landesk_thinkmanagement_upload_asp
- exploit/windows/http/lexmark_markvision_gfd_upload
- exploit/windows/http/lg_simple_editor_rce
- exploit/windows/http/lg_simple_editor_rce_uploadvideo
- exploit/windows/http/mailenable_auth_header
- exploit/windows/http/manage_engine_opmanager_rce
- exploit/windows/http/manageengine_adaudit_plus_authenticated_rce
- exploit/windows/http/manageengine_adaudit_plus_cve_2022_28219
- exploit/windows/http/manageengine_admanager_plus_cve_2023_29084_auth_cmd_injection
- exploit/windows/http/manageengine_adselfservice_plus_cve_2021_40539
- exploit/windows/http/manageengine_adselfservice_plus_cve_2022_28810
- exploit/windows/http/manageengine_adshacluster_rce
- exploit/windows/http/manageengine_appmanager_exec
- exploit/windows/http/manageengine_apps_mngr
- exploit/windows/http/manageengine_connectionid_write
- exploit/windows/http/manageengine_endpoint_central_saml_rce_cve_2022_47966
- exploit/windows/http/manageengine_servicedesk_plus_cve_2021_44077
- exploit/windows/http/maxdb_webdbm_database
- exploit/windows/http/maxdb_webdbm_get_overflow
- exploit/windows/http/mcafee_epolicy_source
- exploit/windows/http/mdaemon_worldclient_form2raw
- exploit/windows/http/minishare_get_overflow
- exploit/windows/http/miniweb_upload_wbem
- exploit/windows/http/moveit_cve_2023_34362
- exploit/windows/http/navicopa_get_overflow
- exploit/windows/http/netdecision_http_bof
- exploit/windows/http/netgear_nms_rce
- exploit/windows/http/netmotion_mobility_mvcutil_deserialization
- exploit/windows/http/northstar_c2_xss_to_agent_rce
- exploit/windows/http/novell_imanager_upload
- exploit/windows/http/novell_mdm_lfi
- exploit/windows/http/novell_messenger_acceptlang
- exploit/windows/http/nowsms
- exploit/windows/http/nscp_authenticated_rce
- exploit/windows/http/oats_weblogic_console
- exploit/windows/http/octopusdeploy_deploy
- exploit/windows/http/oracle9i_xdb_pass
- exploit/windows/http/oracle_beehive_evaluation
- exploit/windows/http/oracle_beehive_prepareaudiotoplay
- exploit/windows/http/oracle_btm_writetofile
- exploit/windows/http/oracle_endeca_exec
- exploit/windows/http/oracle_event_processing_upload
- exploit/windows/http/osb_uname_jlist
- exploit/windows/http/peercast_url
- exploit/windows/http/pgadmin_binary_path_api
- exploit/windows/http/php_apache_request_headers_bof
- exploit/windows/http/php_cgi_arg_injection_rce_cve_2024_4577
- exploit/windows/http/plesk_mylittleadmin_viewstate
- exploit/windows/http/plex_unpickle_dict_rce
- exploit/windows/http/privatewire_gateway
- exploit/windows/http/prtg_authenticated_rce
- exploit/windows/http/prtg_authenticated_rce_cve_2023_32781
- exploit/windows/http/psoproxy91_overflow
- exploit/windows/http/rabidhamster_r4_log
- exploit/windows/http/rejetto_hfs_exec
- exploit/windows/http/rejetto_hfs_rce_cve_2024_23692
- exploit/windows/http/sambar6_search_results
- exploit/windows/http/sap_configservlet_exec_noauth
- exploit/windows/http/sap_host_control_cmd_exec
- exploit/windows/http/sapdb_webtools
- exploit/windows/http/savant_31_overflow
- exploit/windows/http/sepm_auth_bypass_rce
- exploit/windows/http/serviio_checkstreamurl_cmd_exec
- exploit/windows/http/servu_session_cookie
- exploit/windows/http/sharepoint_data_deserialization
- exploit/windows/http/sharepoint_dynamic_proxy_generator_auth_bypass_rce
- exploit/windows/http/sharepoint_ssi_viewstate
- exploit/windows/http/sharepoint_unsafe_control
- exploit/windows/http/sharepoint_workflows_xoml
- exploit/windows/http/shoutcast_format
- exploit/windows/http/shttpd_post
- exploit/windows/http/sitecore_xp_cve_2021_42237
- exploit/windows/http/smartermail_rce
- exploit/windows/http/softing_sis_rce
- exploit/windows/http/solarwinds_fsm_userlogin
- exploit/windows/http/solarwinds_storage_manager_sql
- exploit/windows/http/sonicwall_scrutinizer_sqli
- exploit/windows/http/ssrs_navcorrector_viewstate
- exploit/windows/http/steamcast_useragent
- exploit/windows/http/sws_connection_bof
- exploit/windows/http/sybase_easerver
- exploit/windows/http/syncbreeze_bof
- exploit/windows/http/sysax_create_folder
- exploit/windows/http/telerik_rau_deserialization
- exploit/windows/http/telerik_report_server_deserialization
- exploit/windows/http/tomcat_cgi_cmdlineargs
- exploit/windows/http/trackercam_phparg_overflow
- exploit/windows/http/trackit_file_upload
- exploit/windows/http/trendmicro_officescan
- exploit/windows/http/trendmicro_officescan_widget_exec
- exploit/windows/http/ultraminihttp_bof
- exploit/windows/http/umbraco_upload_aspx
- exploit/windows/http/vmware_vcenter_chargeback_upload
- exploit/windows/http/vxsrchs_bof
- exploit/windows/http/webster_http
- exploit/windows/http/ws_ftp_rce_cve_2023_40044
- exploit/windows/http/xampp_webdav_upload_php
- exploit/windows/http/xitami_if_mod_since
- exploit/windows/http/zentao_pro_rce
- exploit/windows/http/zenworks_assetmgmt_uploadservlet
- exploit/windows/http/zenworks_uploadservlet
- exploit/windows/http/zoho_password_manager_pro_xml_rpc_rce
- ibm (1)
- iis (9)
- exploit/windows/iis/iis_webdav_scstoragepathfromurl
- exploit/windows/iis/iis_webdav_upload_asp
- exploit/windows/iis/ms01_023_printer
- exploit/windows/iis/ms01_026_dbldecode
- exploit/windows/iis/ms01_033_idq
- exploit/windows/iis/ms02_018_htr
- exploit/windows/iis/ms02_065_msadc
- exploit/windows/iis/ms03_007_ntdll_webdav
- exploit/windows/iis/msadc
- imap (16)
- exploit/windows/imap/eudora_list
- exploit/windows/imap/imail_delete
- exploit/windows/imap/ipswitch_search
- exploit/windows/imap/mailenable_login
- exploit/windows/imap/mailenable_status
- exploit/windows/imap/mailenable_w3c_select
- exploit/windows/imap/mdaemon_cram_md5
- exploit/windows/imap/mdaemon_fetch
- exploit/windows/imap/mercur_imap_select_overflow
- exploit/windows/imap/mercur_login
- exploit/windows/imap/mercury_login
- exploit/windows/imap/mercury_rename
- exploit/windows/imap/novell_netmail_append
- exploit/windows/imap/novell_netmail_auth
- exploit/windows/imap/novell_netmail_status
- exploit/windows/imap/novell_netmail_subscribe
- isapi (5)
- ldap (2)
- license (4)
- local (113)
- exploit/windows/local/adobe_sandbox_adobecollabsync
- exploit/windows/local/agnitum_outpost_acs
- exploit/windows/local/alpc_taskscheduler
- exploit/windows/local/always_install_elevated
- exploit/windows/local/anyconnect_lpe
- exploit/windows/local/applocker_bypass
- exploit/windows/local/appxsvc_hard_link_privesc
- exploit/windows/local/ask
- exploit/windows/local/bits_ntlm_token_impersonation
- exploit/windows/local/bthpan
- exploit/windows/local/bypassuac
- exploit/windows/local/bypassuac_comhijack
- exploit/windows/local/bypassuac_dotnet_profiler
- exploit/windows/local/bypassuac_eventvwr
- exploit/windows/local/bypassuac_fodhelper
- exploit/windows/local/bypassuac_injection
- exploit/windows/local/bypassuac_injection_winsxs
- exploit/windows/local/bypassuac_sdclt
- exploit/windows/local/bypassuac_silentcleanup
- exploit/windows/local/bypassuac_sluihijack
- exploit/windows/local/bypassuac_vbs
- exploit/windows/local/bypassuac_windows_store_filesys
- exploit/windows/local/bypassuac_windows_store_reg
- exploit/windows/local/canon_driver_privesc
- exploit/windows/local/capcom_sys_exec
- exploit/windows/local/comahawk
- exploit/windows/local/current_user_psexec
- exploit/windows/local/cve_2017_8464_lnk_lpe
- exploit/windows/local/cve_2018_8453_win32k_priv_esc
- exploit/windows/local/cve_2019_1458_wizardopium
- exploit/windows/local/cve_2020_0668_service_tracing
- exploit/windows/local/cve_2020_0787_bits_arbitrary_file_move
- exploit/windows/local/cve_2020_0796_smbghost
- exploit/windows/local/cve_2020_1048_printerdemon
- exploit/windows/local/cve_2020_1054_drawiconex_lpe
- exploit/windows/local/cve_2020_1313_system_orchestrator
- exploit/windows/local/cve_2020_1337_printerdemon
- exploit/windows/local/cve_2020_17136
- exploit/windows/local/cve_2021_21551_dbutil_memmove
- exploit/windows/local/cve_2021_40449
- exploit/windows/local/cve_2022_21882_win32k
- exploit/windows/local/cve_2022_21999_spoolfool_privesc
- exploit/windows/local/cve_2022_26904_superprofile
- exploit/windows/local/cve_2022_3699_lenovo_diagnostics_driver
- exploit/windows/local/cve_2023_21768_afd_lpe
- exploit/windows/local/cve_2023_28252_clfs_driver
- exploit/windows/local/cve_2024_30088_authz_basep
- exploit/windows/local/dnsadmin_serverlevelplugindll
- exploit/windows/local/docker_credential_wincred
- exploit/windows/local/druva_insync_insynccphwnet64_rcp_type_5_priv_esc
- exploit/windows/local/gog_galaxyclientservice_privesc
- exploit/windows/local/ikeext_service
- exploit/windows/local/ipass_launch_app
- exploit/windows/local/lenovo_systemupdate
- exploit/windows/local/lexmark_driver_privesc
- exploit/windows/local/microfocus_operations_privesc
- exploit/windows/local/mov_ss
- exploit/windows/local/mqac_write
- exploit/windows/local/ms10_015_kitrap0d
- exploit/windows/local/ms10_092_schelevator
- exploit/windows/local/ms11_080_afdjoinleaf
- exploit/windows/local/ms13_005_hwnd_broadcast
- exploit/windows/local/ms13_053_schlamperei
- exploit/windows/local/ms13_081_track_popup_menu
- exploit/windows/local/ms13_097_ie_registry_symlink
- exploit/windows/local/ms14_009_ie_dfsvc
- exploit/windows/local/ms14_058_track_popup_menu
- exploit/windows/local/ms14_070_tcpip_ioctl
- exploit/windows/local/ms15_004_tswbproxy
- exploit/windows/local/ms15_051_client_copy_image
- exploit/windows/local/ms15_078_atmfd_bof
- exploit/windows/local/ms16_014_wmi_recv_notif
- exploit/windows/local/ms16_016_webdav
- exploit/windows/local/ms16_032_secondary_logon_handle_privesc
- exploit/windows/local/ms16_075_reflection
- exploit/windows/local/ms16_075_reflection_juicy
- exploit/windows/local/ms18_8120_win32k_privesc
- exploit/windows/local/ms_ndproxy
- exploit/windows/local/novell_client_nicm
- exploit/windows/local/novell_client_nwfs
- exploit/windows/local/nscp_pe
- exploit/windows/local/ntapphelpcachecontrol
- exploit/windows/local/ntusermndragover
- exploit/windows/local/nvidia_nvsvc
- exploit/windows/local/panda_psevents
- exploit/windows/local/payload_inject
- exploit/windows/local/persistence
- exploit/windows/local/persistence_image_exec_options
- exploit/windows/local/persistence_service
- exploit/windows/local/plantronics_hub_spokesupdateservice_privesc
- exploit/windows/local/powershell_cmd_upgrade
- exploit/windows/local/powershell_remoting
- exploit/windows/local/ppr_flatten_rec
- exploit/windows/local/ps_persist
- exploit/windows/local/ps_wmi_exec
- exploit/windows/local/pxeexploit
- exploit/windows/local/razer_zwopenprocess
- exploit/windows/local/registry_persistence
- exploit/windows/local/ricoh_driver_privesc
- exploit/windows/local/run_as
- exploit/windows/local/s4u_persistence
- exploit/windows/local/service_permissions
- exploit/windows/local/srclient_dll_hijacking
- exploit/windows/local/tokenmagic
- exploit/windows/local/unquoted_service_path
- exploit/windows/local/virtual_box_guest_additions
- exploit/windows/local/virtual_box_opengl_escape
- exploit/windows/local/vss_persistence
- exploit/windows/local/webexec
- exploit/windows/local/win_error_cve_2023_36874
- exploit/windows/local/windscribe_windscribeservice_priv_esc
- exploit/windows/local/wmi
- exploit/windows/local/wmi_persistence
- lotus (4)
- lpd (4)
- misc (115)
- exploit/windows/misc/achat_bof
- exploit/windows/misc/actfax_raw_server_bof
- exploit/windows/misc/agentxpp_receive_agentx
- exploit/windows/misc/ahsay_backup_fileupload
- exploit/windows/misc/ais_esel_server_rce
- exploit/windows/misc/allmediaserver_bof
- exploit/windows/misc/altiris_ds_sqli
- exploit/windows/misc/apple_quicktime_rtsp_response
- exploit/windows/misc/asus_dpcproxy_overflow
- exploit/windows/misc/avaya_winpmd_unihostrouter
- exploit/windows/misc/avidphoneticindexer
- exploit/windows/misc/bakbone_netvault_heap
- exploit/windows/misc/bcaaa_bof
- exploit/windows/misc/bigant_server
- exploit/windows/misc/bigant_server_250
- exploit/windows/misc/bigant_server_dupf_upload
- exploit/windows/misc/bigant_server_sch_dupf_bof
- exploit/windows/misc/bigant_server_usv
- exploit/windows/misc/bomberclone_overflow
- exploit/windows/misc/bopup_comm
- exploit/windows/misc/borland_interbase
- exploit/windows/misc/borland_starteam
- exploit/windows/misc/citrix_streamprocess
- exploit/windows/misc/citrix_streamprocess_data_msg
- exploit/windows/misc/citrix_streamprocess_get_boot_record_request
- exploit/windows/misc/citrix_streamprocess_get_footer
- exploit/windows/misc/citrix_streamprocess_get_objects
- exploit/windows/misc/cloudme_sync
- exploit/windows/misc/commvault_cmd_exec
- exploit/windows/misc/crosschex_device_bof
- exploit/windows/misc/cve_2022_28381_allmediaserver_bof
- exploit/windows/misc/delta_electronics_infrasuite_deserialization
- exploit/windows/misc/disk_savvy_adm
- exploit/windows/misc/doubletake
- exploit/windows/misc/eiqnetworks_esa
- exploit/windows/misc/eiqnetworks_esa_topology
- exploit/windows/misc/enterasys_netsight_syslog_bof
- exploit/windows/misc/eureka_mail_err
- exploit/windows/misc/fb_cnct_group
- exploit/windows/misc/fb_isc_attach_database
- exploit/windows/misc/fb_isc_create_database
- exploit/windows/misc/fb_svc_attach
- exploit/windows/misc/gh0st
- exploit/windows/misc/gimp_script_fu
- exploit/windows/misc/hp_dataprotector_cmd_exec
- exploit/windows/misc/hp_dataprotector_crs
- exploit/windows/misc/hp_dataprotector_dtbclslogin
- exploit/windows/misc/hp_dataprotector_encrypted_comms
- exploit/windows/misc/hp_dataprotector_exec_bar
- exploit/windows/misc/hp_dataprotector_install_service
- exploit/windows/misc/hp_dataprotector_new_folder
- exploit/windows/misc/hp_dataprotector_traversal
- exploit/windows/misc/hp_imc_dbman_restartdb_unauth_rce
- exploit/windows/misc/hp_imc_dbman_restoredbase_unauth_rce
- exploit/windows/misc/hp_imc_uam
- exploit/windows/misc/hp_loadrunner_magentproc
- exploit/windows/misc/hp_loadrunner_magentproc_cmdexec
- exploit/windows/misc/hp_magentservice
- exploit/windows/misc/hp_omniinet_1
- exploit/windows/misc/hp_omniinet_2
- exploit/windows/misc/hp_omniinet_3
- exploit/windows/misc/hp_omniinet_4
- exploit/windows/misc/hp_operations_agent_coda_34
- exploit/windows/misc/hp_operations_agent_coda_8c
- exploit/windows/misc/hp_ovtrace
- exploit/windows/misc/hta_server
- exploit/windows/misc/ib_isc_attach_database
- exploit/windows/misc/ib_isc_create_database
- exploit/windows/misc/ib_svc_attach
- exploit/windows/misc/ibm_cognos_tm1admsd_bof
- exploit/windows/misc/ibm_director_cim_dllinject
- exploit/windows/misc/ibm_tsm_cad_ping
- exploit/windows/misc/ibm_tsm_rca_dicugetidentify
- exploit/windows/misc/ibm_websphere_java_deserialize
- exploit/windows/misc/itunes_extm3u_bof
- exploit/windows/misc/ivanti_avalanche_mdm_bof
- exploit/windows/misc/landesk_aolnsrvr
- exploit/windows/misc/lianja_db_net
- exploit/windows/misc/manageengine_eventlog_analyzer_rce
- exploit/windows/misc/mercury_phonebook
- exploit/windows/misc/mini_stream
- exploit/windows/misc/mirc_privmsg_server
- exploit/windows/misc/mobile_mouse_rce
- exploit/windows/misc/ms07_064_sami
- exploit/windows/misc/ms10_104_sharepoint
- exploit/windows/misc/netcat110_nt
- exploit/windows/misc/nettransport
- exploit/windows/misc/nvidia_mental_ray
- exploit/windows/misc/plugx
- exploit/windows/misc/poisonivy_21x_bof
- exploit/windows/misc/poisonivy_bof
- exploit/windows/misc/poppeeper_date
- exploit/windows/misc/poppeeper_uidl
- exploit/windows/misc/realtek_playlist
- exploit/windows/misc/remote_control_collection_rce
- exploit/windows/misc/remote_mouse_rce
- exploit/windows/misc/sap_2005_license
- exploit/windows/misc/sap_netweaver_dispatcher
- exploit/windows/misc/shixxnote_font
- exploit/windows/misc/solarwinds_amqp_deserialization
- exploit/windows/misc/solidworks_workgroup_pdmwservice_file_write
- exploit/windows/misc/splayer_content_type
- exploit/windows/misc/stream_down_bof
- exploit/windows/misc/talkative_response
- exploit/windows/misc/tiny_identd_overflow
- exploit/windows/misc/trendmicro_cmdprocessor_addtask
- exploit/windows/misc/ufo_ai
- exploit/windows/misc/unified_remote_rce
- exploit/windows/misc/veeam_one_agent_deserialization
- exploit/windows/misc/vmhgfs_webdav_dll_sideload
- exploit/windows/misc/webdav_delivery
- exploit/windows/misc/wifi_mouse_rce
- exploit/windows/misc/windows_rsh
- exploit/windows/misc/wireshark_lua
- exploit/windows/misc/wireshark_packet_dect
- mmsp (1)
- motorola (1)
- mssql (9)
- exploit/windows/mssql/lyris_listmanager_weak_pass
- exploit/windows/mssql/ms02_039_slammer
- exploit/windows/mssql/ms02_056_hello
- exploit/windows/mssql/ms09_004_sp_replwritetovarbin
- exploit/windows/mssql/ms09_004_sp_replwritetovarbin_sqli
- exploit/windows/mssql/mssql_clr_payload
- exploit/windows/mssql/mssql_linkcrawler
- exploit/windows/mssql/mssql_payload
- exploit/windows/mssql/mssql_payload_sqli
- mysql (4)
- nfs (1)
- nimsoft (1)
- nntp (1)
- novell (9)
- exploit/windows/novell/file_reporter_fsfui_upload
- exploit/windows/novell/groupwisemessenger_client
- exploit/windows/novell/netiq_pum_eval
- exploit/windows/novell/nmap_stor
- exploit/windows/novell/zenworks_desktop_agent
- exploit/windows/novell/zenworks_preboot_op21_bof
- exploit/windows/novell/zenworks_preboot_op4c_bof
- exploit/windows/novell/zenworks_preboot_op6_bof
- exploit/windows/novell/zenworks_preboot_op6c_bof
- nuuo (2)
- oracle (6)
- pop3 (1)
- postgres (1)
- proxy (4)
- rdp (2)
- sage (1)
- scada (37)
- exploit/windows/scada/abb_wserver_exec
- exploit/windows/scada/advantech_webaccess_dashboard_file_upload
- exploit/windows/scada/advantech_webaccess_webvrpcs_bof
- exploit/windows/scada/citect_scada_odbc
- exploit/windows/scada/codesys_gateway_server_traversal
- exploit/windows/scada/codesys_web_server
- exploit/windows/scada/daq_factory_bof
- exploit/windows/scada/delta_ia_commgr_bof
- exploit/windows/scada/diaenergie_sqli
- exploit/windows/scada/factorylink_csservice
- exploit/windows/scada/factorylink_vrn_09
- exploit/windows/scada/ge_proficy_cimplicity_gefebt
- exploit/windows/scada/iconics_genbroker
- exploit/windows/scada/iconics_webhmi_setactivexguid
- exploit/windows/scada/igss9_igssdataserver_listall
- exploit/windows/scada/igss9_igssdataserver_rename
- exploit/windows/scada/igss9_misc
- exploit/windows/scada/igss_exec_17
- exploit/windows/scada/indusoft_webstudio_exec
- exploit/windows/scada/moxa_mdmtool
- exploit/windows/scada/mypro_cmdexe
- exploit/windows/scada/procyon_core_server
- exploit/windows/scada/realwin
- exploit/windows/scada/realwin_on_fc_binfile_a
- exploit/windows/scada/realwin_on_fcs_login
- exploit/windows/scada/realwin_scpc_initialize
- exploit/windows/scada/realwin_scpc_initialize_rf
- exploit/windows/scada/realwin_scpc_txtevent
- exploit/windows/scada/rockwell_factorytalk_rce
- exploit/windows/scada/scadapro_cmdexe
- exploit/windows/scada/sunway_force_control_netdbsrv
- exploit/windows/scada/winlog_runtime
- exploit/windows/scada/winlog_runtime_2
- exploit/windows/scada/yokogawa_bkbcopyd_bof
- exploit/windows/scada/yokogawa_bkesimmgr_bof
- exploit/windows/scada/yokogawa_bkfsim_vhfd
- exploit/windows/scada/yokogawa_bkhodeq_bof
- sip (3)
- smb (32)
- exploit/windows/smb/cve_2020_0796_smbghost
- exploit/windows/smb/generic_smb_dll_injection
- exploit/windows/smb/group_policy_startup
- exploit/windows/smb/ipass_pipe_exec
- exploit/windows/smb/ms03_049_netapi
- exploit/windows/smb/ms04_007_killbill
- exploit/windows/smb/ms04_011_lsass
- exploit/windows/smb/ms04_031_netdde
- exploit/windows/smb/ms05_039_pnp
- exploit/windows/smb/ms06_025_rasmans_reg
- exploit/windows/smb/ms06_025_rras
- exploit/windows/smb/ms06_040_netapi
- exploit/windows/smb/ms06_066_nwapi
- exploit/windows/smb/ms06_066_nwwks
- exploit/windows/smb/ms06_070_wkssvc
- exploit/windows/smb/ms07_029_msdns_zonename
- exploit/windows/smb/ms08_067_netapi
- exploit/windows/smb/ms09_050_smb2_negotiate_func_index
- exploit/windows/smb/ms10_046_shortcut_icon_dllloader
- exploit/windows/smb/ms10_061_spoolss
- exploit/windows/smb/ms15_020_shortcut_icon_dllloader
- exploit/windows/smb/ms17_010_eternalblue
- exploit/windows/smb/ms17_010_psexec
- exploit/windows/smb/netidentity_xtierrpcpipe
- exploit/windows/smb/psexec
- exploit/windows/smb/smb_delivery
- exploit/windows/smb/smb_doublepulsar_rce
- exploit/windows/smb/smb_relay
- exploit/windows/smb/smb_rras_erraticgopher
- exploit/windows/smb/smb_shadow
- exploit/windows/smb/timbuktu_plughntcommand_bof
- exploit/windows/smb/webexec
- smtp (7)
- ssh (6)
- ssl (1)
- telnet (2)
- tftp (11)
- exploit/windows/tftp/attftp_long_filename
- exploit/windows/tftp/distinct_tftp_traversal
- exploit/windows/tftp/dlink_long_filename
- exploit/windows/tftp/futuresoft_transfermode
- exploit/windows/tftp/netdecision_tftp_traversal
- exploit/windows/tftp/opentftp_error_code
- exploit/windows/tftp/quick_tftp_pro_mode
- exploit/windows/tftp/tftpd32_long_filename
- exploit/windows/tftp/tftpdwin_long_filename
- exploit/windows/tftp/tftpserver_wrq_bof
- exploit/windows/tftp/threectftpsvc_long_mode
- unicenter (1)
- vnc (4)
- vpn (1)
- winrm (1)
- wins (1)
- nop (11)
- payload (1468)
- aix (4)
- android (9)
- apple_ios (7)
- bsd (24)
- sparc (2)
- vax (1)
- x64 (7)
- x86 (14)
- bsdi (5)
- cmd (884)
- linux (177)
- http (59)
- mips64 (3)
- x64 (18)
- meterpreter (3)
- shell (3)
- payload/cmd/linux/http/x64/exec
- payload/cmd/linux/http/x64/meterpreter_reverse_http
- payload/cmd/linux/http/x64/meterpreter_reverse_https
- payload/cmd/linux/http/x64/meterpreter_reverse_tcp
- payload/cmd/linux/http/x64/pingback_bind_tcp
- payload/cmd/linux/http/x64/pingback_reverse_tcp
- payload/cmd/linux/http/x64/shell_bind_ipv6_tcp
- payload/cmd/linux/http/x64/shell_bind_tcp
- payload/cmd/linux/http/x64/shell_bind_tcp_random_port
- payload/cmd/linux/http/x64/shell_find_port
- payload/cmd/linux/http/x64/shell_reverse_ipv6_tcp
- payload/cmd/linux/http/x64/shell_reverse_tcp
- x86 (38)
- generic (2)
- meterpreter (10)
- payload/cmd/linux/http/x86/meterpreter/bind_ipv6_tcp
- payload/cmd/linux/http/x86/meterpreter/bind_ipv6_tcp_uuid
- payload/cmd/linux/http/x86/meterpreter/bind_nonx_tcp
- payload/cmd/linux/http/x86/meterpreter/bind_tcp
- payload/cmd/linux/http/x86/meterpreter/bind_tcp_uuid
- payload/cmd/linux/http/x86/meterpreter/find_tag
- payload/cmd/linux/http/x86/meterpreter/reverse_ipv6_tcp
- payload/cmd/linux/http/x86/meterpreter/reverse_nonx_tcp
- payload/cmd/linux/http/x86/meterpreter/reverse_tcp
- payload/cmd/linux/http/x86/meterpreter/reverse_tcp_uuid
- shell (10)
- payload/cmd/linux/http/x86/shell/bind_ipv6_tcp
- payload/cmd/linux/http/x86/shell/bind_ipv6_tcp_uuid
- payload/cmd/linux/http/x86/shell/bind_nonx_tcp
- payload/cmd/linux/http/x86/shell/bind_tcp
- payload/cmd/linux/http/x86/shell/bind_tcp_uuid
- payload/cmd/linux/http/x86/shell/find_tag
- payload/cmd/linux/http/x86/shell/reverse_ipv6_tcp
- payload/cmd/linux/http/x86/shell/reverse_nonx_tcp
- payload/cmd/linux/http/x86/shell/reverse_tcp
- payload/cmd/linux/http/x86/shell/reverse_tcp_uuid
- payload/cmd/linux/http/x86/adduser
- payload/cmd/linux/http/x86/chmod
- payload/cmd/linux/http/x86/exec
- payload/cmd/linux/http/x86/meterpreter_reverse_http
- payload/cmd/linux/http/x86/meterpreter_reverse_https
- payload/cmd/linux/http/x86/meterpreter_reverse_tcp
- payload/cmd/linux/http/x86/metsvc_bind_tcp
- payload/cmd/linux/http/x86/metsvc_reverse_tcp
- payload/cmd/linux/http/x86/read_file
- payload/cmd/linux/http/x86/shell_bind_ipv6_tcp
- payload/cmd/linux/http/x86/shell_bind_tcp
- payload/cmd/linux/http/x86/shell_bind_tcp_random_port
- payload/cmd/linux/http/x86/shell_find_port
- payload/cmd/linux/http/x86/shell_find_tag
- payload/cmd/linux/http/x86/shell_reverse_tcp
- payload/cmd/linux/http/x86/shell_reverse_tcp_ipv6
- https (59)
- mips64 (3)
- x64 (18)
- meterpreter (3)
- shell (3)
- payload/cmd/linux/https/x64/exec
- payload/cmd/linux/https/x64/meterpreter_reverse_http
- payload/cmd/linux/https/x64/meterpreter_reverse_https
- payload/cmd/linux/https/x64/meterpreter_reverse_tcp
- payload/cmd/linux/https/x64/pingback_bind_tcp
- payload/cmd/linux/https/x64/pingback_reverse_tcp
- payload/cmd/linux/https/x64/shell_bind_ipv6_tcp
- payload/cmd/linux/https/x64/shell_bind_tcp
- payload/cmd/linux/https/x64/shell_bind_tcp_random_port
- payload/cmd/linux/https/x64/shell_find_port
- payload/cmd/linux/https/x64/shell_reverse_ipv6_tcp
- payload/cmd/linux/https/x64/shell_reverse_tcp
- x86 (38)
- generic (2)
- meterpreter (10)
- payload/cmd/linux/https/x86/meterpreter/bind_ipv6_tcp
- payload/cmd/linux/https/x86/meterpreter/bind_ipv6_tcp_uuid
- payload/cmd/linux/https/x86/meterpreter/bind_nonx_tcp
- payload/cmd/linux/https/x86/meterpreter/bind_tcp
- payload/cmd/linux/https/x86/meterpreter/bind_tcp_uuid
- payload/cmd/linux/https/x86/meterpreter/find_tag
- payload/cmd/linux/https/x86/meterpreter/reverse_ipv6_tcp
- payload/cmd/linux/https/x86/meterpreter/reverse_nonx_tcp
- payload/cmd/linux/https/x86/meterpreter/reverse_tcp
- payload/cmd/linux/https/x86/meterpreter/reverse_tcp_uuid
- shell (10)
- payload/cmd/linux/https/x86/shell/bind_ipv6_tcp
- payload/cmd/linux/https/x86/shell/bind_ipv6_tcp_uuid
- payload/cmd/linux/https/x86/shell/bind_nonx_tcp
- payload/cmd/linux/https/x86/shell/bind_tcp
- payload/cmd/linux/https/x86/shell/bind_tcp_uuid
- payload/cmd/linux/https/x86/shell/find_tag
- payload/cmd/linux/https/x86/shell/reverse_ipv6_tcp
- payload/cmd/linux/https/x86/shell/reverse_nonx_tcp
- payload/cmd/linux/https/x86/shell/reverse_tcp
- payload/cmd/linux/https/x86/shell/reverse_tcp_uuid
- payload/cmd/linux/https/x86/adduser
- payload/cmd/linux/https/x86/chmod
- payload/cmd/linux/https/x86/exec
- payload/cmd/linux/https/x86/meterpreter_reverse_http
- payload/cmd/linux/https/x86/meterpreter_reverse_https
- payload/cmd/linux/https/x86/meterpreter_reverse_tcp
- payload/cmd/linux/https/x86/metsvc_bind_tcp
- payload/cmd/linux/https/x86/metsvc_reverse_tcp
- payload/cmd/linux/https/x86/read_file
- payload/cmd/linux/https/x86/shell_bind_ipv6_tcp
- payload/cmd/linux/https/x86/shell_bind_tcp
- payload/cmd/linux/https/x86/shell_bind_tcp_random_port
- payload/cmd/linux/https/x86/shell_find_port
- payload/cmd/linux/https/x86/shell_find_tag
- payload/cmd/linux/https/x86/shell_reverse_tcp
- payload/cmd/linux/https/x86/shell_reverse_tcp_ipv6
- tftp (59)
- mips64 (3)
- x64 (18)
- meterpreter (3)
- shell (3)
- payload/cmd/linux/tftp/x64/exec
- payload/cmd/linux/tftp/x64/meterpreter_reverse_http
- payload/cmd/linux/tftp/x64/meterpreter_reverse_https
- payload/cmd/linux/tftp/x64/meterpreter_reverse_tcp
- payload/cmd/linux/tftp/x64/pingback_bind_tcp
- payload/cmd/linux/tftp/x64/pingback_reverse_tcp
- payload/cmd/linux/tftp/x64/shell_bind_ipv6_tcp
- payload/cmd/linux/tftp/x64/shell_bind_tcp
- payload/cmd/linux/tftp/x64/shell_bind_tcp_random_port
- payload/cmd/linux/tftp/x64/shell_find_port
- payload/cmd/linux/tftp/x64/shell_reverse_ipv6_tcp
- payload/cmd/linux/tftp/x64/shell_reverse_tcp
- x86 (38)
- generic (2)
- meterpreter (10)
- payload/cmd/linux/tftp/x86/meterpreter/bind_ipv6_tcp
- payload/cmd/linux/tftp/x86/meterpreter/bind_ipv6_tcp_uuid
- payload/cmd/linux/tftp/x86/meterpreter/bind_nonx_tcp
- payload/cmd/linux/tftp/x86/meterpreter/bind_tcp
- payload/cmd/linux/tftp/x86/meterpreter/bind_tcp_uuid
- payload/cmd/linux/tftp/x86/meterpreter/find_tag
- payload/cmd/linux/tftp/x86/meterpreter/reverse_ipv6_tcp
- payload/cmd/linux/tftp/x86/meterpreter/reverse_nonx_tcp
- payload/cmd/linux/tftp/x86/meterpreter/reverse_tcp
- payload/cmd/linux/tftp/x86/meterpreter/reverse_tcp_uuid
- shell (10)
- payload/cmd/linux/tftp/x86/shell/bind_ipv6_tcp
- payload/cmd/linux/tftp/x86/shell/bind_ipv6_tcp_uuid
- payload/cmd/linux/tftp/x86/shell/bind_nonx_tcp
- payload/cmd/linux/tftp/x86/shell/bind_tcp
- payload/cmd/linux/tftp/x86/shell/bind_tcp_uuid
- payload/cmd/linux/tftp/x86/shell/find_tag
- payload/cmd/linux/tftp/x86/shell/reverse_ipv6_tcp
- payload/cmd/linux/tftp/x86/shell/reverse_nonx_tcp
- payload/cmd/linux/tftp/x86/shell/reverse_tcp
- payload/cmd/linux/tftp/x86/shell/reverse_tcp_uuid
- payload/cmd/linux/tftp/x86/adduser
- payload/cmd/linux/tftp/x86/chmod
- payload/cmd/linux/tftp/x86/exec
- payload/cmd/linux/tftp/x86/meterpreter_reverse_http
- payload/cmd/linux/tftp/x86/meterpreter_reverse_https
- payload/cmd/linux/tftp/x86/meterpreter_reverse_tcp
- payload/cmd/linux/tftp/x86/metsvc_bind_tcp
- payload/cmd/linux/tftp/x86/metsvc_reverse_tcp
- payload/cmd/linux/tftp/x86/read_file
- payload/cmd/linux/tftp/x86/shell_bind_ipv6_tcp
- payload/cmd/linux/tftp/x86/shell_bind_tcp
- payload/cmd/linux/tftp/x86/shell_bind_tcp_random_port
- payload/cmd/linux/tftp/x86/shell_find_port
- payload/cmd/linux/tftp/x86/shell_find_tag
- payload/cmd/linux/tftp/x86/shell_reverse_tcp
- payload/cmd/linux/tftp/x86/shell_reverse_tcp_ipv6
- mainframe (4)
- unix (71)
- python (18)
- meterpreter (7)
- payload/cmd/unix/python/meterpreter/bind_tcp
- payload/cmd/unix/python/meterpreter/bind_tcp_uuid
- payload/cmd/unix/python/meterpreter/reverse_http
- payload/cmd/unix/python/meterpreter/reverse_https
- payload/cmd/unix/python/meterpreter/reverse_tcp
- payload/cmd/unix/python/meterpreter/reverse_tcp_ssl
- payload/cmd/unix/python/meterpreter/reverse_tcp_uuid
- payload/cmd/unix/python/meterpreter_bind_tcp
- payload/cmd/unix/python/meterpreter_reverse_http
- payload/cmd/unix/python/meterpreter_reverse_https
- payload/cmd/unix/python/meterpreter_reverse_tcp
- payload/cmd/unix/python/pingback_bind_tcp
- payload/cmd/unix/python/pingback_reverse_tcp
- payload/cmd/unix/python/shell_bind_tcp
- payload/cmd/unix/python/shell_reverse_sctp
- payload/cmd/unix/python/shell_reverse_tcp
- payload/cmd/unix/python/shell_reverse_tcp_ssl
- payload/cmd/unix/python/shell_reverse_udp
- payload/cmd/unix/adduser
- payload/cmd/unix/bind_awk
- payload/cmd/unix/bind_aws_instance_connect
- payload/cmd/unix/bind_busybox_telnetd
- payload/cmd/unix/bind_inetd
- payload/cmd/unix/bind_jjs
- payload/cmd/unix/bind_lua
- payload/cmd/unix/bind_netcat
- payload/cmd/unix/bind_netcat_gaping
- payload/cmd/unix/bind_netcat_gaping_ipv6
- payload/cmd/unix/bind_nodejs
- payload/cmd/unix/bind_perl
- payload/cmd/unix/bind_perl_ipv6
- payload/cmd/unix/bind_r
- payload/cmd/unix/bind_ruby
- payload/cmd/unix/bind_ruby_ipv6
- payload/cmd/unix/bind_socat_sctp
- payload/cmd/unix/bind_socat_udp
- payload/cmd/unix/bind_stub
- payload/cmd/unix/bind_zsh
- payload/cmd/unix/generic
- payload/cmd/unix/interact
- payload/cmd/unix/pingback_bind
- payload/cmd/unix/pingback_reverse
- payload/cmd/unix/reverse
- payload/cmd/unix/reverse_awk
- payload/cmd/unix/reverse_bash
- payload/cmd/unix/reverse_bash_telnet_ssl
- payload/cmd/unix/reverse_bash_udp
- payload/cmd/unix/reverse_jjs
- payload/cmd/unix/reverse_ksh
- payload/cmd/unix/reverse_lua
- payload/cmd/unix/reverse_ncat_ssl
- payload/cmd/unix/reverse_netcat
- payload/cmd/unix/reverse_netcat_gaping
- payload/cmd/unix/reverse_nodejs
- payload/cmd/unix/reverse_openssl
- payload/cmd/unix/reverse_perl
- payload/cmd/unix/reverse_perl_ssl
- payload/cmd/unix/reverse_php_ssl
- payload/cmd/unix/reverse_python
- payload/cmd/unix/reverse_python_ssl
- payload/cmd/unix/reverse_r
- payload/cmd/unix/reverse_ruby
- payload/cmd/unix/reverse_ruby_ssl
- payload/cmd/unix/reverse_socat_sctp
- payload/cmd/unix/reverse_socat_tcp
- payload/cmd/unix/reverse_socat_udp
- payload/cmd/unix/reverse_ssh
- payload/cmd/unix/reverse_ssl_double_telnet
- payload/cmd/unix/reverse_stub
- payload/cmd/unix/reverse_tclsh
- payload/cmd/unix/reverse_zsh
- windows (632)
- http (77)
- x64 (77)
- custom (14)
- payload/cmd/windows/http/x64/custom/bind_ipv6_tcp
- payload/cmd/windows/http/x64/custom/bind_ipv6_tcp_uuid
- payload/cmd/windows/http/x64/custom/bind_named_pipe
- payload/cmd/windows/http/x64/custom/bind_tcp
- payload/cmd/windows/http/x64/custom/bind_tcp_rc4
- payload/cmd/windows/http/x64/custom/bind_tcp_uuid
- payload/cmd/windows/http/x64/custom/reverse_http
- payload/cmd/windows/http/x64/custom/reverse_https
- payload/cmd/windows/http/x64/custom/reverse_named_pipe
- payload/cmd/windows/http/x64/custom/reverse_tcp
- payload/cmd/windows/http/x64/custom/reverse_tcp_rc4
- payload/cmd/windows/http/x64/custom/reverse_tcp_uuid
- payload/cmd/windows/http/x64/custom/reverse_winhttp
- payload/cmd/windows/http/x64/custom/reverse_winhttps
- encrypted_shell (1)
- meterpreter (14)
- payload/cmd/windows/http/x64/meterpreter/bind_ipv6_tcp
- payload/cmd/windows/http/x64/meterpreter/bind_ipv6_tcp_uuid
- payload/cmd/windows/http/x64/meterpreter/bind_named_pipe
- payload/cmd/windows/http/x64/meterpreter/bind_tcp
- payload/cmd/windows/http/x64/meterpreter/bind_tcp_rc4
- payload/cmd/windows/http/x64/meterpreter/bind_tcp_uuid
- payload/cmd/windows/http/x64/meterpreter/reverse_http
- payload/cmd/windows/http/x64/meterpreter/reverse_https
- payload/cmd/windows/http/x64/meterpreter/reverse_named_pipe
- payload/cmd/windows/http/x64/meterpreter/reverse_tcp
- payload/cmd/windows/http/x64/meterpreter/reverse_tcp_rc4
- payload/cmd/windows/http/x64/meterpreter/reverse_tcp_uuid
- payload/cmd/windows/http/x64/meterpreter/reverse_winhttp
- payload/cmd/windows/http/x64/meterpreter/reverse_winhttps
- peinject (10)
- payload/cmd/windows/http/x64/peinject/bind_ipv6_tcp
- payload/cmd/windows/http/x64/peinject/bind_ipv6_tcp_uuid
- payload/cmd/windows/http/x64/peinject/bind_named_pipe
- payload/cmd/windows/http/x64/peinject/bind_tcp
- payload/cmd/windows/http/x64/peinject/bind_tcp_rc4
- payload/cmd/windows/http/x64/peinject/bind_tcp_uuid
- payload/cmd/windows/http/x64/peinject/reverse_named_pipe
- payload/cmd/windows/http/x64/peinject/reverse_tcp
- payload/cmd/windows/http/x64/peinject/reverse_tcp_rc4
- payload/cmd/windows/http/x64/peinject/reverse_tcp_uuid
- shell (9)
- payload/cmd/windows/http/x64/shell/bind_ipv6_tcp
- payload/cmd/windows/http/x64/shell/bind_ipv6_tcp_uuid
- payload/cmd/windows/http/x64/shell/bind_named_pipe
- payload/cmd/windows/http/x64/shell/bind_tcp
- payload/cmd/windows/http/x64/shell/bind_tcp_rc4
- payload/cmd/windows/http/x64/shell/bind_tcp_uuid
- payload/cmd/windows/http/x64/shell/reverse_tcp
- payload/cmd/windows/http/x64/shell/reverse_tcp_rc4
- payload/cmd/windows/http/x64/shell/reverse_tcp_uuid
- vncinject (13)
- payload/cmd/windows/http/x64/vncinject/bind_ipv6_tcp
- payload/cmd/windows/http/x64/vncinject/bind_ipv6_tcp_uuid
- payload/cmd/windows/http/x64/vncinject/bind_named_pipe
- payload/cmd/windows/http/x64/vncinject/bind_tcp
- payload/cmd/windows/http/x64/vncinject/bind_tcp_rc4
- payload/cmd/windows/http/x64/vncinject/bind_tcp_uuid
- payload/cmd/windows/http/x64/vncinject/reverse_http
- payload/cmd/windows/http/x64/vncinject/reverse_https
- payload/cmd/windows/http/x64/vncinject/reverse_tcp
- payload/cmd/windows/http/x64/vncinject/reverse_tcp_rc4
- payload/cmd/windows/http/x64/vncinject/reverse_tcp_uuid
- payload/cmd/windows/http/x64/vncinject/reverse_winhttp
- payload/cmd/windows/http/x64/vncinject/reverse_winhttps
- payload/cmd/windows/http/x64/encrypted_shell_reverse_tcp
- payload/cmd/windows/http/x64/exec
- payload/cmd/windows/http/x64/loadlibrary
- payload/cmd/windows/http/x64/messagebox
- payload/cmd/windows/http/x64/meterpreter_bind_named_pipe
- payload/cmd/windows/http/x64/meterpreter_bind_tcp
- payload/cmd/windows/http/x64/meterpreter_reverse_http
- payload/cmd/windows/http/x64/meterpreter_reverse_https
- payload/cmd/windows/http/x64/meterpreter_reverse_ipv6_tcp
- payload/cmd/windows/http/x64/meterpreter_reverse_tcp
- payload/cmd/windows/http/x64/pingback_reverse_tcp
- payload/cmd/windows/http/x64/powershell_bind_tcp
- payload/cmd/windows/http/x64/powershell_reverse_tcp
- payload/cmd/windows/http/x64/powershell_reverse_tcp_ssl
- payload/cmd/windows/http/x64/shell_bind_tcp
- payload/cmd/windows/http/x64/shell_reverse_tcp
- https (77)
- x64 (77)
- custom (14)
- payload/cmd/windows/https/x64/custom/bind_ipv6_tcp
- payload/cmd/windows/https/x64/custom/bind_ipv6_tcp_uuid
- payload/cmd/windows/https/x64/custom/bind_named_pipe
- payload/cmd/windows/https/x64/custom/bind_tcp
- payload/cmd/windows/https/x64/custom/bind_tcp_rc4
- payload/cmd/windows/https/x64/custom/bind_tcp_uuid
- payload/cmd/windows/https/x64/custom/reverse_http
- payload/cmd/windows/https/x64/custom/reverse_https
- payload/cmd/windows/https/x64/custom/reverse_named_pipe
- payload/cmd/windows/https/x64/custom/reverse_tcp
- payload/cmd/windows/https/x64/custom/reverse_tcp_rc4
- payload/cmd/windows/https/x64/custom/reverse_tcp_uuid
- payload/cmd/windows/https/x64/custom/reverse_winhttp
- payload/cmd/windows/https/x64/custom/reverse_winhttps
- encrypted_shell (1)
- meterpreter (14)
- payload/cmd/windows/https/x64/meterpreter/bind_ipv6_tcp
- payload/cmd/windows/https/x64/meterpreter/bind_ipv6_tcp_uuid
- payload/cmd/windows/https/x64/meterpreter/bind_named_pipe
- payload/cmd/windows/https/x64/meterpreter/bind_tcp
- payload/cmd/windows/https/x64/meterpreter/bind_tcp_rc4
- payload/cmd/windows/https/x64/meterpreter/bind_tcp_uuid
- payload/cmd/windows/https/x64/meterpreter/reverse_http
- payload/cmd/windows/https/x64/meterpreter/reverse_https
- payload/cmd/windows/https/x64/meterpreter/reverse_named_pipe
- payload/cmd/windows/https/x64/meterpreter/reverse_tcp
- payload/cmd/windows/https/x64/meterpreter/reverse_tcp_rc4
- payload/cmd/windows/https/x64/meterpreter/reverse_tcp_uuid
- payload/cmd/windows/https/x64/meterpreter/reverse_winhttp
- payload/cmd/windows/https/x64/meterpreter/reverse_winhttps
- peinject (10)
- payload/cmd/windows/https/x64/peinject/bind_ipv6_tcp
- payload/cmd/windows/https/x64/peinject/bind_ipv6_tcp_uuid
- payload/cmd/windows/https/x64/peinject/bind_named_pipe
- payload/cmd/windows/https/x64/peinject/bind_tcp
- payload/cmd/windows/https/x64/peinject/bind_tcp_rc4
- payload/cmd/windows/https/x64/peinject/bind_tcp_uuid
- payload/cmd/windows/https/x64/peinject/reverse_named_pipe
- payload/cmd/windows/https/x64/peinject/reverse_tcp
- payload/cmd/windows/https/x64/peinject/reverse_tcp_rc4
- payload/cmd/windows/https/x64/peinject/reverse_tcp_uuid
- shell (9)
- payload/cmd/windows/https/x64/shell/bind_ipv6_tcp
- payload/cmd/windows/https/x64/shell/bind_ipv6_tcp_uuid
- payload/cmd/windows/https/x64/shell/bind_named_pipe
- payload/cmd/windows/https/x64/shell/bind_tcp
- payload/cmd/windows/https/x64/shell/bind_tcp_rc4
- payload/cmd/windows/https/x64/shell/bind_tcp_uuid
- payload/cmd/windows/https/x64/shell/reverse_tcp
- payload/cmd/windows/https/x64/shell/reverse_tcp_rc4
- payload/cmd/windows/https/x64/shell/reverse_tcp_uuid
- vncinject (13)
- payload/cmd/windows/https/x64/vncinject/bind_ipv6_tcp
- payload/cmd/windows/https/x64/vncinject/bind_ipv6_tcp_uuid
- payload/cmd/windows/https/x64/vncinject/bind_named_pipe
- payload/cmd/windows/https/x64/vncinject/bind_tcp
- payload/cmd/windows/https/x64/vncinject/bind_tcp_rc4
- payload/cmd/windows/https/x64/vncinject/bind_tcp_uuid
- payload/cmd/windows/https/x64/vncinject/reverse_http
- payload/cmd/windows/https/x64/vncinject/reverse_https
- payload/cmd/windows/https/x64/vncinject/reverse_tcp
- payload/cmd/windows/https/x64/vncinject/reverse_tcp_rc4
- payload/cmd/windows/https/x64/vncinject/reverse_tcp_uuid
- payload/cmd/windows/https/x64/vncinject/reverse_winhttp
- payload/cmd/windows/https/x64/vncinject/reverse_winhttps
- payload/cmd/windows/https/x64/encrypted_shell_reverse_tcp
- payload/cmd/windows/https/x64/exec
- payload/cmd/windows/https/x64/loadlibrary
- payload/cmd/windows/https/x64/messagebox
- payload/cmd/windows/https/x64/meterpreter_bind_named_pipe
- payload/cmd/windows/https/x64/meterpreter_bind_tcp
- payload/cmd/windows/https/x64/meterpreter_reverse_http
- payload/cmd/windows/https/x64/meterpreter_reverse_https
- payload/cmd/windows/https/x64/meterpreter_reverse_ipv6_tcp
- payload/cmd/windows/https/x64/meterpreter_reverse_tcp
- payload/cmd/windows/https/x64/pingback_reverse_tcp
- payload/cmd/windows/https/x64/powershell_bind_tcp
- payload/cmd/windows/https/x64/powershell_reverse_tcp
- payload/cmd/windows/https/x64/powershell_reverse_tcp_ssl
- payload/cmd/windows/https/x64/shell_bind_tcp
- payload/cmd/windows/https/x64/shell_reverse_tcp
- powershell (290)
- custom (28)
- payload/cmd/windows/powershell/custom/bind_hidden_ipknock_tcp
- payload/cmd/windows/powershell/custom/bind_hidden_tcp
- payload/cmd/windows/powershell/custom/bind_ipv6_tcp
- payload/cmd/windows/powershell/custom/bind_ipv6_tcp_uuid
- payload/cmd/windows/powershell/custom/bind_named_pipe
- payload/cmd/windows/powershell/custom/bind_nonx_tcp
- payload/cmd/windows/powershell/custom/bind_tcp
- payload/cmd/windows/powershell/custom/bind_tcp_rc4
- payload/cmd/windows/powershell/custom/bind_tcp_uuid
- payload/cmd/windows/powershell/custom/find_tag
- payload/cmd/windows/powershell/custom/reverse_hop_http
- payload/cmd/windows/powershell/custom/reverse_http
- payload/cmd/windows/powershell/custom/reverse_http_proxy_pstore
- payload/cmd/windows/powershell/custom/reverse_https
- payload/cmd/windows/powershell/custom/reverse_https_proxy
- payload/cmd/windows/powershell/custom/reverse_ipv6_tcp
- payload/cmd/windows/powershell/custom/reverse_named_pipe
- payload/cmd/windows/powershell/custom/reverse_nonx_tcp
- payload/cmd/windows/powershell/custom/reverse_ord_tcp
- payload/cmd/windows/powershell/custom/reverse_tcp
- payload/cmd/windows/powershell/custom/reverse_tcp_allports
- payload/cmd/windows/powershell/custom/reverse_tcp_dns
- payload/cmd/windows/powershell/custom/reverse_tcp_rc4
- payload/cmd/windows/powershell/custom/reverse_tcp_rc4_dns
- payload/cmd/windows/powershell/custom/reverse_tcp_uuid
- payload/cmd/windows/powershell/custom/reverse_udp
- payload/cmd/windows/powershell/custom/reverse_winhttp
- payload/cmd/windows/powershell/custom/reverse_winhttps
- dllinject (23)
- payload/cmd/windows/powershell/dllinject/bind_hidden_ipknock_tcp
- payload/cmd/windows/powershell/dllinject/bind_hidden_tcp
- payload/cmd/windows/powershell/dllinject/bind_ipv6_tcp
- payload/cmd/windows/powershell/dllinject/bind_ipv6_tcp_uuid
- payload/cmd/windows/powershell/dllinject/bind_named_pipe
- payload/cmd/windows/powershell/dllinject/bind_nonx_tcp
- payload/cmd/windows/powershell/dllinject/bind_tcp
- payload/cmd/windows/powershell/dllinject/bind_tcp_rc4
- payload/cmd/windows/powershell/dllinject/bind_tcp_uuid
- payload/cmd/windows/powershell/dllinject/find_tag
- payload/cmd/windows/powershell/dllinject/reverse_hop_http
- payload/cmd/windows/powershell/dllinject/reverse_http
- payload/cmd/windows/powershell/dllinject/reverse_http_proxy_pstore
- payload/cmd/windows/powershell/dllinject/reverse_ipv6_tcp
- payload/cmd/windows/powershell/dllinject/reverse_nonx_tcp
- payload/cmd/windows/powershell/dllinject/reverse_ord_tcp
- payload/cmd/windows/powershell/dllinject/reverse_tcp
- payload/cmd/windows/powershell/dllinject/reverse_tcp_allports
- payload/cmd/windows/powershell/dllinject/reverse_tcp_dns
- payload/cmd/windows/powershell/dllinject/reverse_tcp_rc4
- payload/cmd/windows/powershell/dllinject/reverse_tcp_rc4_dns
- payload/cmd/windows/powershell/dllinject/reverse_tcp_uuid
- payload/cmd/windows/powershell/dllinject/reverse_winhttp
- generic (2)
- meterpreter (27)
- payload/cmd/windows/powershell/meterpreter/bind_hidden_ipknock_tcp
- payload/cmd/windows/powershell/meterpreter/bind_hidden_tcp
- payload/cmd/windows/powershell/meterpreter/bind_ipv6_tcp
- payload/cmd/windows/powershell/meterpreter/bind_ipv6_tcp_uuid
- payload/cmd/windows/powershell/meterpreter/bind_named_pipe
- payload/cmd/windows/powershell/meterpreter/bind_nonx_tcp
- payload/cmd/windows/powershell/meterpreter/bind_tcp
- payload/cmd/windows/powershell/meterpreter/bind_tcp_rc4
- payload/cmd/windows/powershell/meterpreter/bind_tcp_uuid
- payload/cmd/windows/powershell/meterpreter/find_tag
- payload/cmd/windows/powershell/meterpreter/reverse_hop_http
- payload/cmd/windows/powershell/meterpreter/reverse_http
- payload/cmd/windows/powershell/meterpreter/reverse_http_proxy_pstore
- payload/cmd/windows/powershell/meterpreter/reverse_https
- payload/cmd/windows/powershell/meterpreter/reverse_https_proxy
- payload/cmd/windows/powershell/meterpreter/reverse_ipv6_tcp
- payload/cmd/windows/powershell/meterpreter/reverse_named_pipe
- payload/cmd/windows/powershell/meterpreter/reverse_nonx_tcp
- payload/cmd/windows/powershell/meterpreter/reverse_ord_tcp
- payload/cmd/windows/powershell/meterpreter/reverse_tcp
- payload/cmd/windows/powershell/meterpreter/reverse_tcp_allports
- payload/cmd/windows/powershell/meterpreter/reverse_tcp_dns
- payload/cmd/windows/powershell/meterpreter/reverse_tcp_rc4
- payload/cmd/windows/powershell/meterpreter/reverse_tcp_rc4_dns
- payload/cmd/windows/powershell/meterpreter/reverse_tcp_uuid
- payload/cmd/windows/powershell/meterpreter/reverse_winhttp
- payload/cmd/windows/powershell/meterpreter/reverse_winhttps
- patchupdllinject (19)
- payload/cmd/windows/powershell/patchupdllinject/bind_hidden_ipknock_tcp
- payload/cmd/windows/powershell/patchupdllinject/bind_hidden_tcp
- payload/cmd/windows/powershell/patchupdllinject/bind_ipv6_tcp
- payload/cmd/windows/powershell/patchupdllinject/bind_ipv6_tcp_uuid
- payload/cmd/windows/powershell/patchupdllinject/bind_named_pipe
- payload/cmd/windows/powershell/patchupdllinject/bind_nonx_tcp
- payload/cmd/windows/powershell/patchupdllinject/bind_tcp
- payload/cmd/windows/powershell/patchupdllinject/bind_tcp_rc4
- payload/cmd/windows/powershell/patchupdllinject/bind_tcp_uuid
- payload/cmd/windows/powershell/patchupdllinject/find_tag
- payload/cmd/windows/powershell/patchupdllinject/reverse_ipv6_tcp
- payload/cmd/windows/powershell/patchupdllinject/reverse_nonx_tcp
- payload/cmd/windows/powershell/patchupdllinject/reverse_ord_tcp
- payload/cmd/windows/powershell/patchupdllinject/reverse_tcp
- payload/cmd/windows/powershell/patchupdllinject/reverse_tcp_allports
- payload/cmd/windows/powershell/patchupdllinject/reverse_tcp_dns
- payload/cmd/windows/powershell/patchupdllinject/reverse_tcp_rc4
- payload/cmd/windows/powershell/patchupdllinject/reverse_tcp_rc4_dns
- payload/cmd/windows/powershell/patchupdllinject/reverse_tcp_uuid
- patchupmeterpreter (19)
- payload/cmd/windows/powershell/patchupmeterpreter/bind_hidden_ipknock_tcp
- payload/cmd/windows/powershell/patchupmeterpreter/bind_hidden_tcp
- payload/cmd/windows/powershell/patchupmeterpreter/bind_ipv6_tcp
- payload/cmd/windows/powershell/patchupmeterpreter/bind_ipv6_tcp_uuid
- payload/cmd/windows/powershell/patchupmeterpreter/bind_named_pipe
- payload/cmd/windows/powershell/patchupmeterpreter/bind_nonx_tcp
- payload/cmd/windows/powershell/patchupmeterpreter/bind_tcp
- payload/cmd/windows/powershell/patchupmeterpreter/bind_tcp_rc4
- payload/cmd/windows/powershell/patchupmeterpreter/bind_tcp_uuid
- payload/cmd/windows/powershell/patchupmeterpreter/find_tag
- payload/cmd/windows/powershell/patchupmeterpreter/reverse_ipv6_tcp
- payload/cmd/windows/powershell/patchupmeterpreter/reverse_nonx_tcp
- payload/cmd/windows/powershell/patchupmeterpreter/reverse_ord_tcp
- payload/cmd/windows/powershell/patchupmeterpreter/reverse_tcp
- payload/cmd/windows/powershell/patchupmeterpreter/reverse_tcp_allports
- payload/cmd/windows/powershell/patchupmeterpreter/reverse_tcp_dns
- payload/cmd/windows/powershell/patchupmeterpreter/reverse_tcp_rc4
- payload/cmd/windows/powershell/patchupmeterpreter/reverse_tcp_rc4_dns
- payload/cmd/windows/powershell/patchupmeterpreter/reverse_tcp_uuid
- peinject (20)
- payload/cmd/windows/powershell/peinject/bind_hidden_ipknock_tcp
- payload/cmd/windows/powershell/peinject/bind_hidden_tcp
- payload/cmd/windows/powershell/peinject/bind_ipv6_tcp
- payload/cmd/windows/powershell/peinject/bind_ipv6_tcp_uuid
- payload/cmd/windows/powershell/peinject/bind_named_pipe
- payload/cmd/windows/powershell/peinject/bind_nonx_tcp
- payload/cmd/windows/powershell/peinject/bind_tcp
- payload/cmd/windows/powershell/peinject/bind_tcp_rc4
- payload/cmd/windows/powershell/peinject/bind_tcp_uuid
- payload/cmd/windows/powershell/peinject/find_tag
- payload/cmd/windows/powershell/peinject/reverse_ipv6_tcp
- payload/cmd/windows/powershell/peinject/reverse_named_pipe
- payload/cmd/windows/powershell/peinject/reverse_nonx_tcp
- payload/cmd/windows/powershell/peinject/reverse_ord_tcp
- payload/cmd/windows/powershell/peinject/reverse_tcp
- payload/cmd/windows/powershell/peinject/reverse_tcp_allports
- payload/cmd/windows/powershell/peinject/reverse_tcp_dns
- payload/cmd/windows/powershell/peinject/reverse_tcp_rc4
- payload/cmd/windows/powershell/peinject/reverse_tcp_rc4_dns
- payload/cmd/windows/powershell/peinject/reverse_tcp_uuid
- shell (20)
- payload/cmd/windows/powershell/shell/bind_hidden_ipknock_tcp
- payload/cmd/windows/powershell/shell/bind_hidden_tcp
- payload/cmd/windows/powershell/shell/bind_ipv6_tcp
- payload/cmd/windows/powershell/shell/bind_ipv6_tcp_uuid
- payload/cmd/windows/powershell/shell/bind_named_pipe
- payload/cmd/windows/powershell/shell/bind_nonx_tcp
- payload/cmd/windows/powershell/shell/bind_tcp
- payload/cmd/windows/powershell/shell/bind_tcp_rc4
- payload/cmd/windows/powershell/shell/bind_tcp_uuid
- payload/cmd/windows/powershell/shell/find_tag
- payload/cmd/windows/powershell/shell/reverse_ipv6_tcp
- payload/cmd/windows/powershell/shell/reverse_nonx_tcp
- payload/cmd/windows/powershell/shell/reverse_ord_tcp
- payload/cmd/windows/powershell/shell/reverse_tcp
- payload/cmd/windows/powershell/shell/reverse_tcp_allports
- payload/cmd/windows/powershell/shell/reverse_tcp_dns
- payload/cmd/windows/powershell/shell/reverse_tcp_rc4
- payload/cmd/windows/powershell/shell/reverse_tcp_rc4_dns
- payload/cmd/windows/powershell/shell/reverse_tcp_uuid
- payload/cmd/windows/powershell/shell/reverse_udp
- upexec (20)
- payload/cmd/windows/powershell/upexec/bind_hidden_ipknock_tcp
- payload/cmd/windows/powershell/upexec/bind_hidden_tcp
- payload/cmd/windows/powershell/upexec/bind_ipv6_tcp
- payload/cmd/windows/powershell/upexec/bind_ipv6_tcp_uuid
- payload/cmd/windows/powershell/upexec/bind_named_pipe
- payload/cmd/windows/powershell/upexec/bind_nonx_tcp
- payload/cmd/windows/powershell/upexec/bind_tcp
- payload/cmd/windows/powershell/upexec/bind_tcp_rc4
- payload/cmd/windows/powershell/upexec/bind_tcp_uuid
- payload/cmd/windows/powershell/upexec/find_tag
- payload/cmd/windows/powershell/upexec/reverse_ipv6_tcp
- payload/cmd/windows/powershell/upexec/reverse_nonx_tcp
- payload/cmd/windows/powershell/upexec/reverse_ord_tcp
- payload/cmd/windows/powershell/upexec/reverse_tcp
- payload/cmd/windows/powershell/upexec/reverse_tcp_allports
- payload/cmd/windows/powershell/upexec/reverse_tcp_dns