1 |
Lame 1 2 |
Lame |
CVE-2007-2447, CVE-2004-2687, CVE-2009-1185, unix, smb, samba, smbmap, smbclient, distccd, process, udev |
2 |
Shocker 1 2 |
Shocker |
CVE-2014-6271, unix, cgi-*, cgi-bin, user.sh, shellshock, gtfobins, sudo, RCE, reverse shell |
3 |
Bashed 1 2 |
Bashed |
unix, sudo, cronjob/scheduled task, RCE, reverse shell |
4 |
Nibbles 1 2 |
Nibbles |
CVE-2015-6967, CVE-2017-16995, unix, sudo, nibbleblog, kernel, RCE, default creds, source code inspection |
5 |
Beep 1 2 |
Beep |
CVE:N/A 1, CVE-2012-4869, CVE-2014-6271, CVE-2012-4867, CVE-2016-1713, CVE-2015-6000, CVE-2013-3214, CVE-2013-3215, unix, sudo, Elastix, PBX, LFI, svwar, webmin, shellshock, cgi-*, smtp, pop3, email, vTiger CRM, reverse shell, ssh |
6 |
Sense 1 2 |
Sense |
CVE-2014-4688, CVE-2016-10709, unix, default creds, rce, stored creds, pfsense |
7 |
Valentine 1 2 |
Valentine |
CVE-2014-0160, CVE-2014-0346, CVE-2016-5195, unix, heartbleed ssl/tsl, sslyze, bruteforce/decrypt/decode, hash/encrypted/encoded, ssh, openssl, kernel exploit, dirtycow, system binary exploit, tmux session |
8 |
Sunday 1 2 |
Sunday |
unix, bruteforce/decrypt/decode, finger, hydra, hash/encrypted/encoded, ssh, stored creds, sudo, suid, system/config/backup file, shadow.backup, hashid, john, hashcat, wget, gtfobins, openssl, passwd, wget --post-file, Overwrite Different SUID Binary, Overwrite shadow, Overwrite sudoers, /etc/sudoers, pspy, cronjob/scheduled task, solaris, powershell |
9 |
Irked 1 2 |
Irked |
CVE-2010-2075, CVE-2016-1531, CVE-2018-6789, unix, hidden file, rce, reverse shell, stego, steghide, stored creds, suid, IRC, UnrealIRCd, Irssi, hexchat, Exim, ltrace |
10 |
FriendZone 1 2 |
FriendZone |
CVE-2021-3156, CVE-2019-10149, unix, subdomain, DNS, DNS zone transfer, XSS, LFI, local file inclusion, burp, rce, reverse shell, smb, stored creds, system/config/backup file, mysql, sql conf file, mysql_data.conf, pspy, cronjob/scheduled task, Python Library Hijacking, writable python module, source code inspection, aquatone, impacket, smbclient, crackmapexec, smtp, Exim, Sudo Baron Samedit vulnerability |
11 |
CozyHosting 1 2 |
CozyHosting |
unix, whitelabel error page, Spring Boot framework, actuator, session cookie, burp, rce, obfuscate, base64/URL encoded reverse shell, whitespaces not allowed, bypass without space, $IFS, obfuscate, java archive, jar xf, jd-gui, application.properties, postgresql, psql, hash/encrypted/encoded, john, hashcat, bcrypt, sudo, gtfobins, ssh |
12 |
Keeper 1 2 |
Keeper |
CVE-2023-32784, unix, Request Tracker, default creds, unzip, stored creds, password manager, KeePass, .kdbx, .dmp, keepas2, .NET, dotnet, Danish dish, rødgrød med fløde, PuTTY PPK, .ppk, .pem, puttygen, putty, ssh |
13 |
Analytics 1 2 |
Analytics |
CVE-2023-38646, CVE-2021-3493, CVE-2023-2640, CVE-2023-32629, unix, Metabase, business intelligence platform, subdomain, rce, Metabase Pre-Auth RCE, JDBC, setup-token, burp, base64 encoded reverse shell, json, curl, docker container, environment variables, stored creds, ssh, kernel, OverlayFS, GameOver(lay) |
14 |
Codify 1 2 |
Codify |
CVE-2023–30547, unix, node.js, vm2 library, sandbox escape, rce, reverse shell, SQLite, stored creds, bcrypt, hash/encrypted/encoded, john, hashcat, sudo, mysql, insecure/unquoted variable comparison, pattern matching, bruteforcing , scripting, ~/.ssh/authorized_keys |
15 |
Devvortex 1 2 |
Devvortex |
CVE-2023–23752, CVE-2023–26604, unix, subdomain, joomla, joomscan, improper access check, data exfiltration, rce, reverse shell, template, mysql, stored creds, bcrypt, hash/encrypted/encoded, john, hashcat, sudo, apport-cli |
16 |
SwagShop 1 2 |
SwagShop |
CVE-2015-1397, CVE:N/A 1, unix, magento, e-commerce, cms, PHP Object Injection, deserialization, mechanize, authenticated rce, rce, file upload, reverse shell, sudo, gtfobins, magescan, Mage Scan, Magento package, burp, mysql, sqli, Froghopper Attack |
17 |
Networked 1 2 |
Networked |
unix, cron/scheduled tasks, rce, reverse shell, file upload, mime types, magic bytes, burp, source code inspection, exec(), sudo, system/config/backup file, tar, command injection, ifcfg, networking script, exiftool, steghide |
18 |
Crafty 1 2 |
Crafty |
CVE-2021-44228, windows, Minecraft, log4j, java logging library, java archive, jdk, Minecraft Python Client Library, pyCraft, virtual environment, virtualenv, ldap server, jndi, .jar, msfvenom, payload, windows/x64/meterpreter/reverse_tcp, Metasploit, multi/handler, certutil, meterpreter, download, upload, Java Decompiler, jdg-gui, stored creds, evil-winrm, nc.exe, RunasCs, Minecraft Console Client (MCC), Plugins, wmic product, Powershell, Windows Run As Reverse Shell / New-Object System.Management.Automation.PSCredential, post/windows/manage/run_as_psh |
19 |
Perfection 1 2 |
Perfection |
unix, ruby app, SSTI, Server Side Template Injection, url encoding, bypass, escape characters, line feed, Linefeed (newline), %0A, sqlite, stored creds, system/config/backup file, bruteforce/decrypt/decode, hash/encrypted/encoded, hash-identifier, hashid, sha256, SHA2-256, hashcat, crackstation.net, linpeas.sh, /var/mail, hashcat brute-force attack-mode, sudo, hurl |
20 |
Tabby 1 2 |
Tabby |
CVE:N/A 1, unix, apache tomcat, view page source code, local file inclusion, LFI, code review, api, file upload, stored creds, manager webapp, host-manager, admin-gui, manager-gui, tomcat-users.xml, /usr/share/tomcat9/etc/tomcat-users.xml, Text-based manager, curl, -T, --upload-file, java, msfvenom, java/shell_reverse_tcp, Java reverse shell, .war, system/config/backup file, .zip, bruteforce/decrypt/decode, hash/encrypted/encoded, zip2john, john, fcrackzip, user groups, lxd/lxc, container, Alpine Linux container, /etc/passwd, /etc/sudoers, SUID, bash -p, euid, openssl |
21 |
Legacy 1 2 |
Legacy |
CVE-2008-4250 (ms08-067) / Conficker, CVE-2017-0144, CVE-2017-0143, ms17-010 / Eternal Blue / Shadow Brokers / WannaCry / NotPetya, windows, Windows XP Pro SP3, Windows 2000 LAN Manager, smb, smbv1, rpc, nmap scripts, nse, Windows Kernel, Impacket, shellcode, msfvenom, windows/shell_reverse_tcp, bad characters, whoami.exe, /usr/share/windows-binaries, smbserver.py, /usr/share/doc/python3-impacket/examples/smbserver.py, NT AUTHORITY\SYSTEM, windows/smb/ms08_067_netapi, TFTP server, exploit/windows/smb/ms17_010_psexec |
22 |
Blue 1 2 |
Blue |
CVE-2017-0144, CVE-2017-0143, ms17-010 / Eternal Blue / Shadow Brokers / WannaCry / NotPetya, Windows, windows 7, smb, smbv1, Windows Kernel, mysmb.py, msfvenom, windows/shell_reverse_tcp, enum4linux, smbmap, NT AUTHORITY\SYSTEM, windows/smb/ms17_010_eternalblue, impacket |
23 |
Devel 1 2 |
Devel |
CVE-2011-1249 / MS11–046 / afd.sys, Windows, ftp, Microsoft IIS, aspnet_client, asp.net, .aspx, msfvenom, windows/shell_reverse_tcp, /usr/share/windows-binaries/, smbserver.py, systeminfo, powershell, nishang / Invoke-PowerShellTcp, Windows 7 Build 7600 on x86, i686-w64-mingw32-gcc, Windows kernel, NT AUTHORITY\SYSTEM, meterpreter, exploit/multi/handler, windows/meterpreter/reverse_tcp, Watson, .NET versions, registry, Visual Studio, .sln, Windows Exploits, local exploit suggester, post/multi/recon/local_exploit_suggester, MS10-015, exploit/windows/local/ms10_015_kitrap0d, ms15_051, exploit/windows/local/ms15_051_client_copy_image, Mimikatz, kiwi, lsa_dump_sam, ms14_058, windows/local/ms14_058_track_popup_menu, ms13_053, windows/local/ms13_053_schlamperei, SeAssignPrimaryTokenPrivilege, SeImpersonatePrivilege, Juicy Potato, Rotten Potato, CLSID, Abusing Token Privileges |
24 |
Headless 1 2 |
Headless |
unix, upnp, XSS, Burp, JWT, cookie, is_admin, User-Agent, User Agent, document.cookie, account takeover, command injection, sudo, SUID, /usr/bin/syscheck, /bin/bash, /bin/bash -p |
25 |
Optimum 1 2 |
Optimum |
CVE-2014-6287, MS16-098 / Kernel, CVE-2016-0099 / MS16-032, Invoke-MS16032, CVE-2016-7214 / MS16-135, Windows, Windows Server 2012 R2, HttpFileServer, HFS, Rejetto, /usr/share/windows-binaries, Windows Exploit Suggester, systeminfo, Invoke-PowerShellTcpOneLine.ps1, powershell, IEX, Invoke-Expression, winPEAS, smbserver.py, microsoft.net, .NET, Watson, Sherlock, sysNative, metasploit, exploit/windows/http/rejetto_hfs_exec, local exploit suggester, post/multi/recon/local_exploit_suggester, msfvenom, windows/x64/powershell_reverse_tcp |
26 |
Granny 1 2 |
Granny |
MS15-051 / CVE:N/A 1, MS14-058, CVE-2017-7269, MS14-070 / CVE-2014-1767, ms10_015, MS09-012, Windows, Windows 2003 server, iis, WebDAV, allowed HTTP methods, davtest, upload arbitrary files, HTTP PUT, MOVE, .aspx, .html, .txt, curl, msfvenom, windows/shell_reverse_tcp, Windows Exploit Suggester, systeminfo, kernel vulnerability, metasploit, local exploit suggester, post/multi/recon/local_exploit_suggester, /usr/share/webshells/aspx/cmdasp.aspx, exploit/multi/handler, churrasco.exe, /usr/share/sqlninja/apps/churrasco.exe, SeImpersonatePrivilege, Juicy Potato, Rotten Potato, CLSID, Abusing Token Privileges, wget vbs script, cadaver |
27 |
Arctic 1 2 |
Arctic |
CVE-2009-2265, CVE-2010-2554 / MS10-059, CVE-2010-2861, MS15-051, Windows, Windows Server 2008, local file inclusion, LFI, Arbitrary File Upload, stored creds, msfvenom, .jsp, java/jsp_shell_reverse_tcp, Windows Exploit Suggester, Flight Message Transfer Protocol (FMTP), CFIDE, cfdocs, adobe coldfusion, Directory Traversal, cfadminPassword, SHA1, HMAC SHA1, salt, console.log, hex_hmac_sha1, document.loginform.salt.value, Developer Tools, burp, js (javascript), authentication bypass, web passing the hash, Kernel Vulnerability, smbserver.py, cronjob/scheduled task, CFM webshell, SeImpersonatePrivilege, Juicy Potato, Rotten Potato, CLSID, Abusing Token Privileges, windows/x64/shell_reverse_tcp, Windows Exploit Suggester 2, WES-NG, PowerUp.ps1, accesschk64.exe, exploit/windows/http/coldfusion_fckeditor, exploit/windows/local/ms10_092_schelevator, multi/recon/local_exploit_suggester, windows/local/ms16_014_wmi_recv_notif |