Metasploit Module Library


This page contains list of all Metasploit modules currently available in the latest release of the Metasploit Framework version 6.x.

There are the following 7 different module types in Metasploit:

  1. Exploits - Modules for exploiting a vulnerability and delivering a payload. There are remote exploits, local exploits, privilege escalation exploits, client-side exploits, web application exploits and many others.
  2. Payloads - Modules for performing an action during the exploitation, e.g. establishing meterpreter session, reverse shell, executing a command, downloading and executing a program etc. Payloads can be staged and non-staged.
  3. Post - Modules for post exploitation action such as credential / hash dumping, local privilege escalation, backdoor installation, sensitive data extraction, network traffic tunneling (proxying), keylogging, screen capturing and many other actions.
  4. Auxiliary - Modules for auxiliary actions such as network scanning, enumeration, vulnerability scanning, login brute force and cracking, fuzzing, spidering (traversal), data extraction and many others.
  5. Encoders - Modules for payload encoding and encryption such as base64, XOR, shikata_ga_nai etc. This can help with obfuscation to evade defenses such as Antivirus or NIDS (network intrusion detection systems), EDR (endpoint detection and response) etc.
  6. Evasions - Modules for evading defenses such as Antivirus evasion, AppLocker bypass, software restriction policies (SRP) bypass etc.
  7. Nops - Modules for generating a harmless, benign "No Operation" instructions, e.g. for padding purposes, sliding in memory during exploitation etc.

List of Metasploit Modules


Below is the complete list of Metasploit modules. In total, there are more than 4,800 modules in the latest development version of Metasploit Framework 6.x which is currently available in Kali Linux. Please use the Search function below to find a particular module, e.g.: ms17 scanner.

Metasploit ModuleName
auxiliary/admin/2wire/xslt_password_reset2Wire Cross-Site Request Forgery Password Reset Vulnerability
auxiliary/admin/android/google_play_store_uxss_xframe_rceAndroid Browser RCE Through Google Play Store XFO
auxiliary/admin/appletv/appletv_display_imageApple TV Image Remote Control
auxiliary/admin/appletv/appletv_display_videoApple TV Video Remote Control
auxiliary/admin/atg/atg_clientVeeder-Root Automatic Tank Gauge (ATG) Administrative Client
auxiliary/admin/aws/aws_launch_instancesLaunches Hosts in AWS
auxiliary/admin/backupexec/dumpVeritas Backup Exec Windows Remote File Access
auxiliary/admin/backupexec/registryVeritas Backup Exec Server Registry Access
auxiliary/admin/chromecast/chromecast_resetChromecast Factory Reset DoS
auxiliary/admin/chromecast/chromecast_youtubeChromecast YouTube Remote Control
auxiliary/admin/citrix/citrix_netscaler_config_decryptDecrypt Citrix NetScaler Config Secrets
auxiliary/admin/db2/db2rcmdIBM DB2 db2rcmd.exe Command Execution Vulnerability
auxiliary/admin/dcerpc/cve_2020_1472_zerologonNetlogon Weak Cryptographic Authentication
auxiliary/admin/dcerpc/cve_2021_1675_printnightmarePrint Spooler Remote DLL Injection
auxiliary/admin/dcerpc/icpr_certICPR Certificate Management
auxiliary/admin/dcerpc/samr_computerSAMR Computer Management
auxiliary/admin/dns/dyn_dns_updateDNS Server Dynamic Update Record Injection
auxiliary/admin/edirectory/edirectory_dhost_cookieNovell eDirectory DHOST Predictable Session Cookie
auxiliary/admin/edirectory/edirectory_edirutilNovell eDirectory eMBox Unauthenticated File Access
auxiliary/admin/emc/alphastor_devicemanager_execEMC AlphaStor Device Manager Arbitrary Command Execution
auxiliary/admin/emc/alphastor_librarymanager_execEMC AlphaStor Library Manager Arbitrary Command Execution
auxiliary/admin/firetv/firetv_youtubeAmazon Fire TV YouTube Remote Control
auxiliary/admin/hp/hp_data_protector_cmdHP Data Protector 6.1 EXEC_CMD Command Execution
auxiliary/admin/hp/hp_ilo_create_admin_accountHP iLO 4 1.00-2.50 Authentication Bypass Administrator Account Creation
auxiliary/admin/hp/hp_imc_som_create_accountHP Intelligent Management SOM Account Creation
auxiliary/admin/http/allegro_rompager_auth_bypassAllegro Software RomPager 'Misfortune Cookie' (CVE-2014-9222) Authentication Bypass
auxiliary/admin/http/arris_motorola_surfboard_backdoor_xssArris / Motorola Surfboard SBG6580 Web Interface Takeover
auxiliary/admin/http/axigen_file_accessAxigen Arbitrary File Read and Delete
auxiliary/admin/http/cfme_manageiq_evm_pass_resetRed Hat CloudForms Management Engine 5.1 miq_policy/explorer SQL Injection
auxiliary/admin/http/cisco_7937g_ssh_privescCisco 7937G SSH Privilege Escalation
auxiliary/admin/http/cnpilot_r_cmd_execCambium cnPilot r200/r201 Command Execution as 'root'
auxiliary/admin/http/cnpilot_r_fptCambium cnPilot r200/r201 File Path Traversal
auxiliary/admin/http/contentkeeper_fileaccessContentKeeper Web Appliance mimencode File Access
auxiliary/admin/http/dlink_dir_300_600_exec_noauthD-Link DIR-600 / DIR-300 Unauthenticated Remote Command Execution
auxiliary/admin/http/dlink_dir_645_password_extractorD-Link DIR 645 Password Extractor
auxiliary/admin/http/dlink_dsl320b_password_extractorD-Link DSL 320B Password Extractor
auxiliary/admin/http/foreman_openstack_satellite_priv_escForeman (Red Hat OpenStack/Satellite) users/create Mass Assignment
auxiliary/admin/http/gitstack_restGitStack Unauthenticated REST API Requests
auxiliary/admin/http/grafana_auth_bypassGrafana 2.0 through 5.2.2 authentication bypass for LDAP and OAuth
auxiliary/admin/http/hikvision_unauth_pwd_reset_cve_2017_7921Hikvision IP Camera Unauthenticated Password Change Via Improper Authentication Logic
auxiliary/admin/http/hp_web_jetadmin_execHP Web JetAdmin 6.5 Server Arbitrary Command Execution
auxiliary/admin/http/ibm_drm_downloadIBM Data Risk Manager Arbitrary File Download
auxiliary/admin/http/iis_auth_bypassMS10-065 Microsoft IIS 5 NTFS Stream Authentication Bypass
auxiliary/admin/http/intersil_pass_resetIntersil (Boa) HTTPd Basic Authentication Password Reset
auxiliary/admin/http/iomega_storcenterpro_sessionidIomega StorCenter Pro NAS Web Authentication Bypass
auxiliary/admin/http/jboss_bshdeployerJBoss JMX Console Beanshell Deployer WAR Upload and Deployment
auxiliary/admin/http/jboss_deploymentfilerepositoryJBoss JMX Console DeploymentFileRepository WAR Upload and Deployment
auxiliary/admin/http/jboss_seam_execJBoss Seam 2 Remote Command Execution
auxiliary/admin/http/joomla_registration_privescJoomla Account Creation and Privilege Escalation
auxiliary/admin/http/kaseya_master_adminKaseya VSA Master Administrator Account Creation
auxiliary/admin/http/katello_satellite_priv_escKatello (Red Hat Satellite) users/update_roles Missing Authorization
auxiliary/admin/http/limesurvey_file_downloadLimesurvey Unauthenticated File Download
auxiliary/admin/http/linksys_e1500_e2500_execLinksys E1500/E2500 Remote Command Execution
auxiliary/admin/http/linksys_tmunblock_admin_reset_bofLinksys WRT120N tmUnblock Stack Buffer Overflow
auxiliary/admin/http/linksys_wrt54gl_execLinksys WRT54GL Remote Command Execution
auxiliary/admin/http/manage_engine_dc_create_adminManageEngine Desktop Central Administrator Account Creation
auxiliary/admin/http/manageengine_dir_listingManageEngine Multiple Products Arbitrary Directory Listing
auxiliary/admin/http/manageengine_file_downloadManageEngine Multiple Products Arbitrary File Download
auxiliary/admin/http/manageengine_pmp_privescManageEngine Password Manager SQLAdvancedALSearchResult.cc Pro SQL Injection
auxiliary/admin/http/mantisbt_password_resetMantisBT password reset
auxiliary/admin/http/mutiny_frontend_read_deleteMutiny 5 Arbitrary File Read and Delete
auxiliary/admin/http/netflow_file_downloadManageEngine NetFlow Analyzer Arbitrary File Download
auxiliary/admin/http/netgear_auth_downloadNETGEAR ProSafe Network Management System 300 Authenticated File Download
auxiliary/admin/http/netgear_pnpx_getsharefolderlist_auth_bypassNetgear PNPX_GetShareFolderList Authentication Bypass
auxiliary/admin/http/netgear_r6700_pass_resetNetgear R6700v3 Unauthenticated LAN Admin Password Reset
auxiliary/admin/http/netgear_r7000_backup_cgi_heap_overflow_rceNetgear R7000 backup.cgi Heap Overflow RCE
auxiliary/admin/http/netgear_soap_password_extractorNetgear Unauthenticated SOAP Password Extractor
auxiliary/admin/http/netgear_wnr2000_pass_recoveryNETGEAR WNR2000v5 Administrator Password Recovery
auxiliary/admin/http/nexpose_xxe_file_readNexpose XXE Arbitrary File Read
auxiliary/admin/http/novell_file_reporter_filedeleteNovell File Reporter Agent Arbitrary File Delete
auxiliary/admin/http/nuuo_nvrmini_resetNUUO NVRmini 2 / NETGEAR ReadyNAS Surveillance Default Configuration Load and Administrator Password Reset
auxiliary/admin/http/openbravo_xxeOpenbravo ERP XXE Arbitrary File Read
auxiliary/admin/http/pfadmin_set_protected_aliasPostfixadmin Protected Alias Deletion Vulnerability
auxiliary/admin/http/pihole_domains_api_execPi-Hole Top Domains API Authenticated Exec
auxiliary/admin/http/rails_devise_pass_resetRuby on Rails Devise Authentication Password Reset
auxiliary/admin/http/scadabr_credential_dumpScadaBR Credentials Dumper
auxiliary/admin/http/scrutinizer_add_userPlixer Scrutinizer NetFlow and sFlow Analyzer HTTP Authentication Bypass
auxiliary/admin/http/sophos_wpa_traversalSophos Web Protection Appliance patience.cgi Directory Traversal
auxiliary/admin/http/supra_smart_cloud_tv_rfiSupra Smart Cloud TV Remote File Inclusion
auxiliary/admin/http/sysaid_admin_acctSysAid Help Desk Administrator Account Creation
auxiliary/admin/http/sysaid_file_downloadSysAid Help Desk Arbitrary File Download
auxiliary/admin/http/sysaid_sql_credsSysAid Help Desk Database Credentials Disclosure
auxiliary/admin/http/telpho10_credential_dumpTelpho10 Backup Credentials Dumper
auxiliary/admin/http/tomcat_administrationTomcat Administration Tool Default Access
auxiliary/admin/http/tomcat_ghostcatGhostcat
auxiliary/admin/http/tomcat_utf8_traversalTomcat UTF-8 Directory Traversal Vulnerability
auxiliary/admin/http/trendmicro_dlp_traversalTrendMicro Data Loss Prevention 5.5 Directory Traversal
auxiliary/admin/http/typo3_news_module_sqliTYPO3 News Module SQL Injection
auxiliary/admin/http/typo3_sa_2009_001TYPO3 sa-2009-001 Weak Encryption Key File Disclosure
auxiliary/admin/http/typo3_sa_2009_002Typo3 sa-2009-002 File Disclosure
auxiliary/admin/http/typo3_sa_2010_020TYPO3 sa-2010-020 Remote File Disclosure
auxiliary/admin/http/typo3_winstaller_default_enc_keysTYPO3 Winstaller Default Encryption Keys
auxiliary/admin/http/ulterius_file_downloadUlterius Server File Download Vulnerability
auxiliary/admin/http/vbulletin_upgrade_adminvBulletin Administrator Account Creation
auxiliary/admin/http/webnms_cred_disclosureWebNMS Framework Server Credential Disclosure
auxiliary/admin/http/webnms_file_downloadWebNMS Framework Server Arbitrary Text File Download
auxiliary/admin/http/wp_automatic_plugin_privescWordPress Plugin Automatic Config Change to RCE
auxiliary/admin/http/wp_custom_contact_formsWordPress custom-contact-forms Plugin SQL Upload
auxiliary/admin/http/wp_easycart_privilege_escalationWordPress WP EasyCart Plugin Privilege Escalation
auxiliary/admin/http/wp_gdpr_compliance_privescWordPress WP GDPR Compliance Plugin Privilege Escalation
auxiliary/admin/http/wp_google_maps_sqliWordPress Google Maps Plugin SQL Injection
auxiliary/admin/http/wp_masterstudy_privescWordpress MasterStudy Admin Account Creation
auxiliary/admin/http/wp_symposium_sql_injectionWordPress Symposium Plugin SQL Injection
auxiliary/admin/http/wp_wplms_privilege_escalationWordPress WPLMS Theme Privilege Escalation
auxiliary/admin/http/zyxel_admin_password_extractorZyXEL GS1510-16 Password Extractor
auxiliary/admin/kerberos/ms14_068_kerberos_checksumMS14-068 Microsoft Kerberos Checksum Validation Vulnerability
auxiliary/admin/ldap/rbcdRole Base Constrained Delegation
auxiliary/admin/ldap/vmware_vcenter_vmdir_auth_bypassVMware vCenter Server vmdir Authentication Bypass
auxiliary/admin/maxdb/maxdb_cons_execSAP MaxDB cons.exe Remote Command Injection
auxiliary/admin/misc/sercomm_dump_configSerComm Device Configuration Dump
auxiliary/admin/misc/wolUDP Wake-On-Lan (WOL)
auxiliary/admin/motorola/wr850g_credMotorola WR850G v4.03 Credentials
auxiliary/admin/ms/ms08_059_his2006Microsoft Host Integration Server 2006 Command Execution Vulnerability
auxiliary/admin/mssql/mssql_enum_domain_accountsMicrosoft SQL Server SUSER_SNAME Windows Domain Account Enumeration
auxiliary/admin/mssql/mssql_enum_domain_accounts_sqliMicrosoft SQL Server SQLi SUSER_SNAME Windows Domain Account Enumeration
auxiliary/admin/mssql/mssql_enumMicrosoft SQL Server Configuration Enumerator
auxiliary/admin/mssql/mssql_enum_sql_loginsMicrosoft SQL Server SUSER_SNAME SQL Logins Enumeration
auxiliary/admin/mssql/mssql_escalate_dbownerMicrosoft SQL Server Escalate Db_Owner
auxiliary/admin/mssql/mssql_escalate_dbowner_sqliMicrosoft SQL Server SQLi Escalate Db_Owner
auxiliary/admin/mssql/mssql_escalate_execute_asMicrosoft SQL Server Escalate EXECUTE AS
auxiliary/admin/mssql/mssql_escalate_execute_as_sqliMicrosoft SQL Server SQLi Escalate Execute AS
auxiliary/admin/mssql/mssql_execMicrosoft SQL Server Command Execution
auxiliary/admin/mssql/mssql_findandsampledataMicrosoft SQL Server Find and Sample Data
auxiliary/admin/mssql/mssql_idfMicrosoft SQL Server Interesting Data Finder
auxiliary/admin/mssql/mssql_ntlm_stealerMicrosoft SQL Server NTLM Stealer
auxiliary/admin/mssql/mssql_ntlm_stealer_sqliMicrosoft SQL Server SQLi NTLM Stealer
auxiliary/admin/mssql/mssql_sql_fileMicrosoft SQL Server Generic Query from File
auxiliary/admin/mssql/mssql_sqlMicrosoft SQL Server Generic Query
auxiliary/admin/mysql/mysql_enumMySQL Enumeration Module
auxiliary/admin/mysql/mysql_sqlMySQL SQL Generic Query
auxiliary/admin/natpmp/natpmp_mapNAT-PMP Port Mapper
auxiliary/admin/netbios/netbios_spoofNetBIOS Response Brute Force Spoof (Direct)
auxiliary/admin/networking/arista_configArista Configuration Importer
auxiliary/admin/networking/brocade_configBrocade Configuration Importer
auxiliary/admin/networking/cisco_asa_extrabaconCisco ASA Authentication Bypass (EXTRABACON)
auxiliary/admin/networking/cisco_configCisco Configuration Importer
auxiliary/admin/networking/cisco_dcnm_auth_bypassCisco DCNM auth bypass
auxiliary/admin/networking/cisco_dcnm_downloadCisco Data Center Network Manager Unauthenticated File Download
auxiliary/admin/networking/cisco_secure_acs_bypassCisco Secure ACS Unauthorized Password Change
auxiliary/admin/networking/cisco_vpn_3000_ftp_bypassCisco VPN Concentrator 3000 FTP Unauthorized Administrative Access
auxiliary/admin/networking/f5_configF5 Configuration Importer
auxiliary/admin/networking/juniper_configJuniper Configuration Importer
auxiliary/admin/networking/mikrotik_configMikrotik Configuration Importer
auxiliary/admin/networking/ubiquiti_configUbiquiti Configuration Importer
auxiliary/admin/networking/vyos_configVyOS Configuration Importer
auxiliary/admin/officescan/tmlisten_traversalTrendMicro OfficeScanNT Listener Traversal Arbitrary File Access
auxiliary/admin/oracle/oracle_index_privescOracle DB Privilege Escalation via Function-Based Index
auxiliary/admin/oracle/oracle_loginOracle Account Discovery
auxiliary/admin/oracle/oracle_sqlOracle SQL Generic Query
auxiliary/admin/oracle/oraenumOracle Database Enumeration
auxiliary/admin/oracle/ora_ntlm_stealerOracle SMB Relay Code Execution
auxiliary/admin/oracle/osb_execqr2Oracle Secure Backup Authentication Bypass/Command Injection Vulnerability
auxiliary/admin/oracle/osb_execqr3Oracle Secure Backup Authentication Bypass/Command Injection Vulnerability
auxiliary/admin/oracle/osb_execqrOracle Secure Backup exec_qr() Command Injection Vulnerability
auxiliary/admin/oracle/post_exploitation/win32execOracle Java execCommand (Win32)
auxiliary/admin/oracle/post_exploitation/win32uploadOracle URL Download
auxiliary/admin/oracle/sid_bruteOracle TNS Listener SID Brute Forcer
auxiliary/admin/oracle/tnscmdOracle TNS Listener Command Issuer
auxiliary/admin/pop2/uw_fileretrievalUoW pop2d Remote File Retrieval Vulnerability
auxiliary/admin/postgres/postgres_readfilePostgreSQL Server Generic Query
auxiliary/admin/postgres/postgres_sqlPostgreSQL Server Generic Query
auxiliary/admin/sap/cve_2020_6207_solman_rceSAP Solution Manager remote unauthorized OS commands execution
auxiliary/admin/sap/cve_2020_6287_ws_add_userSAP Unauthenticated WebService User Creation
auxiliary/admin/sap/sap_configservlet_exec_noauthSAP ConfigServlet OS Command Execution
auxiliary/admin/sap/sap_igs_xmlchart_xxeSAP Internet Graphics Server (IGS) XMLCHART XXE
auxiliary/admin/sap/sap_mgmt_con_osexecSAP Management Console OSExecute
auxiliary/admin/scada/advantech_webaccess_dbvisitor_sqliAdvantech WebAccess DBVisitor.dll ChartThemeConfig SQL Injection
auxiliary/admin/scada/ge_proficy_substitute_traversalGE Proficy Cimplicity WebView substitute.bcl Directory Traversal
auxiliary/admin/scada/modicon_commandSchneider Modicon Remote START/STOP Command
auxiliary/admin/scada/modicon_password_recoverySchneider Modicon Quantum Password Recovery
auxiliary/admin/scada/modicon_stux_transferSchneider Modicon Ladder Logic Upload/Download
auxiliary/admin/scada/moxa_credentials_recoveryMoxa Device Credential Retrieval
auxiliary/admin/scada/multi_cip_commandAllen-Bradley/Rockwell Automation EtherNet/IP CIP Commands
auxiliary/admin/scada/pcom_commandUnitronics PCOM remote START/STOP/RESET command
auxiliary/admin/scada/phoenix_commandPhoenixContact PLC Remote START/STOP Command
auxiliary/admin/scada/yokogawa_bkbcopyd_clientYokogawa BKBCopyD.exe Client
auxiliary/admin/serverprotect/fileTrendMicro ServerProtect File Access
auxiliary/admin/smb/check_dir_fileSMB Scanner Check File/Directory Utility
auxiliary/admin/smb/delete_fileSMB File Delete Utility
auxiliary/admin/smb/download_fileSMB File Download Utility
auxiliary/admin/smb/list_directorySMB Directory Listing Utility
auxiliary/admin/smb/ms17_010_commandMS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Command Execution
auxiliary/admin/smb/psexec_ntdsgrabPsExec NTDS.dit And SYSTEM Hive Download Utility
auxiliary/admin/smb/samba_symlink_traversalSamba Symlink Directory Traversal
auxiliary/admin/smb/upload_fileSMB File Upload Utility
auxiliary/admin/smb/webexec_commandWebEx Remote Command Execution Utility
auxiliary/admin/sunrpc/solaris_kcms_readfileSolaris KCMS + TTDB Arbitrary File Read
auxiliary/admin/teradata/teradata_odbc_sqlTeradata ODBC SQL Query Module
auxiliary/admin/tftp/tftp_transfer_utilTFTP File Transfer Utility
auxiliary/admin/tikiwiki/tikidblibTikiWiki Information Disclosure
auxiliary/admin/upnp/soap_portmappingUPnP IGD SOAP Port Mapping Utility
auxiliary/admin/vmware/poweroff_vmVMWare Power Off Virtual Machine
auxiliary/admin/vmware/poweron_vmVMWare Power On Virtual Machine
auxiliary/admin/vmware/tag_vmVMWare Tag Virtual Machine
auxiliary/admin/vmware/terminate_esx_sessionsVMWare Terminate ESX Login Sessions
auxiliary/admin/vmware/vcenter_forge_saml_tokenVMware vCenter Forge SAML Authentication Credentials
auxiliary/admin/vmware/vcenter_offline_mdb_extractVMware vCenter Extract Secrets from vmdir / vmafd DB File
auxiliary/admin/vnc/realvnc_41_bypassRealVNC NULL Authentication Mode Bypass
auxiliary/admin/vxworks/apple_airport_extreme_passwordApple Airport Extreme Password Extraction (WDBRPC)
auxiliary/admin/vxworks/dlink_i2eye_autoanswerD-Link i2eye Video Conference AutoAnswer (WDBRPC)
auxiliary/admin/vxworks/wdbrpc_memory_dumpVxWorks WDB Agent Remote Memory Dump
auxiliary/admin/vxworks/wdbrpc_rebootVxWorks WDB Agent Remote Reboot
auxiliary/admin/webmin/edit_html_fileaccessWebmin edit_html.cgi file Parameter Traversal Arbitrary File Access
auxiliary/admin/webmin/file_disclosureWebmin File Disclosure
auxiliary/admin/wemo/crockpotBelkin Wemo-Enabled Crock-Pot Remote Control
auxiliary/admin/zend/java_bridgeZend Server Java Bridge Design Flaw Remote Code Execution
auxiliary/analyze/apply_potApply Pot File To Hashes
auxiliary/analyze/crack_aixPassword Cracker: AIX
auxiliary/analyze/crack_databasesPassword Cracker: Databases
auxiliary/analyze/crack_linuxPassword Cracker: Linux
auxiliary/analyze/crack_mobilePassword Cracker: Mobile
auxiliary/analyze/crack_osxPassword Cracker: OSX
auxiliary/analyze/crack_webappsPassword Cracker: Webapps
auxiliary/analyze/crack_windowsPassword Cracker: Windows
auxiliary/analyze/modbus_zipExtract zip from Modbus communication
auxiliary/bnat/bnat_routerBNAT Router
auxiliary/bnat/bnat_scanBNAT Scanner
auxiliary/client/hwbridge/connectHardware Bridge Session Connector
auxiliary/client/iec104/iec104IEC104 Client Utility
auxiliary/client/mms/send_mmsMMS Client
auxiliary/client/sms/send_textSMS Client
auxiliary/client/smtp/emailerGeneric Emailer (SMTP)
auxiliary/client/telegram/send_messageTelegram Message Client
auxiliary/cloud/aws/enum_ec2Amazon Web Services EC2 instance enumeration
auxiliary/cloud/aws/enum_iamAmazon Web Services IAM credential enumeration
auxiliary/cloud/aws/enum_s3Amazon Web Services S3 instance enumeration
auxiliary/cloud/kubernetes/enum_kubernetesKubernetes Enumeration
auxiliary/crawler/msfcrawlerMetasploit Web Crawler
auxiliary/docx/word_unc_injectorMicrosoft Word UNC Path Injector
auxiliary/dos/android/android_stock_browser_iframeAndroid Stock Browser Iframe DOS
auxiliary/dos/apple_ios/webkit_backdrop_filter_bluriOS Safari Denial of Service with CSS
auxiliary/dos/cisco/cisco_7937g_dosCisco 7937G Denial-of-Service Attack
auxiliary/dos/cisco/cisco_7937g_dos_rebootCisco 7937G Denial-of-Service Reboot Attack
auxiliary/dos/cisco/ios_http_percentpercentCisco IOS HTTP GET /%% Request Denial of Service
auxiliary/dos/cisco/ios_telnet_rocemCisco IOS Telnet Denial of Service
auxiliary/dos/dhcp/isc_dhcpd_clientidISC DHCP Zero Length ClientID Denial of Service Module
auxiliary/dos/dns/bind_tkeyBIND TKEY Query Denial of Service
auxiliary/dos/dns/bind_tsig_badtimeBIND TSIG Badtime Query Denial of Service
auxiliary/dos/dns/bind_tsigBIND TSIG Query Denial of Service
auxiliary/dos/freebsd/nfsd/nfsd_mountFreeBSD Remote NFS RPC Request Denial of Service
auxiliary/dos/hp/data_protector_rdsHP Data Protector Manager RDS DOS
auxiliary/dos/http/3com_superstack_switch3Com SuperStack Switch Denial of Service
auxiliary/dos/http/apache_commons_fileupload_dosApache Commons FileUpload and Apache Tomcat DoS
auxiliary/dos/http/apache_mod_isapiApache mod_isapi Dangling Pointer
auxiliary/dos/http/apache_range_dosApache Range Header DoS (Apache Killer)
auxiliary/dos/http/apache_tomcat_transfer_encodingApache Tomcat Transfer-Encoding Information Disclosure and DoS
auxiliary/dos/http/brother_debut_dosBrother Debut http Denial Of Service
auxiliary/dos/http/cable_haunt_websocket_dos"Cablehaunt" Cable Modem WebSocket DoS
auxiliary/dos/http/canon_wireless_printerCanon Wireless Printer Denial Of Service
auxiliary/dos/http/dell_openmanage_postDell OpenManage POST Request Heap Overflow (win32)
auxiliary/dos/http/f5_bigip_apm_max_sessionsF5 BigIP Access Policy Manager Session Exhaustion Denial of Service
auxiliary/dos/http/flexense_http_server_dosFlexense HTTP Server Denial Of Service
auxiliary/dos/http/gzip_bomb_dosGzip Memory Bomb Denial Of Service
auxiliary/dos/http/hashcollision_dosHashtable Collisions
auxiliary/dos/http/ibm_lotus_notes2IBM Notes Denial Of Service
auxiliary/dos/http/ibm_lotus_notesIBM Notes encodeURI DOS
auxiliary/dos/http/marked_redosmarked npm module "heading" ReDoS
auxiliary/dos/http/metasploit_httphandler_dosMetasploit HTTP(S) handler DoS
auxiliary/dos/http/monkey_headersMonkey HTTPD Header Parsing Denial of Service (DoS)
auxiliary/dos/http/ms15_034_ulonglongaddMS15-034 HTTP Protocol Stack Request Handling Denial-of-Service
auxiliary/dos/http/nodejs_pipeliningNode.js HTTP Pipelining Denial of Service
auxiliary/dos/http/novell_file_reporter_heap_bofNFR Agent Heap Overflow Vulnerability
auxiliary/dos/http/rails_action_viewRuby on Rails Action View MIME Memory Exhaustion
auxiliary/dos/http/rails_json_float_dosRuby on Rails JSON Processor Floating Point Heap Overflow DoS
auxiliary/dos/http/slowlorisSlowloris Denial of Service Attack
auxiliary/dos/http/sonicwall_ssl_formatSonicWALL SSL-VPN Format String Vulnerability
auxiliary/dos/http/squid_range_dosSquid Proxy Range Header DoS
auxiliary/dos/http/tautulli_shutdown_execTautulli v2.1.9 - Shutdown Denial of Service
auxiliary/dos/http/ua_parser_js_redosua-parser-js npm module ReDoS
auxiliary/dos/http/webkitplusWebKitGTK+ WebKitFaviconDatabase DoS
auxiliary/dos/http/webrick_regexRuby WEBrick::HTTP::DefaultFileHandler DoS
auxiliary/dos/http/wordpress_directory_traversal_dosWordPress Traversal Directory DoS
auxiliary/dos/http/wordpress_long_password_dosWordPress Long Password DoS
auxiliary/dos/http/wordpress_xmlrpc_dosWordpress XMLRPC DoS
auxiliary/dos/http/ws_dosws - Denial of Service
auxiliary/dos/mdns/avahi_portzeroAvahi Source Port 0 DoS
auxiliary/dos/misc/dopewarsDopewars Denial of Service
auxiliary/dos/misc/ibm_sametime_webplayer_dosIBM Lotus Sametime WebPlayer DoS
auxiliary/dos/misc/ibm_tsm_dosIBM Tivoli Storage Manager FastBack Server Opcode 0x534 Denial of Service
auxiliary/dos/misc/memcachedMemcached Remote Denial of Service
auxiliary/dos/ntp/ntpd_reserved_dosNTP.org ntpd Reserved Mode Denial of Service
auxiliary/dos/pptp/ms02_063_pptp_dosMS02-063 PPTP Malformed Control Data Kernel Denial of Service
auxiliary/dos/rpc/rpcbombRPC DoS targeting *nix rpcbind/libtirpc
auxiliary/dos/samba/lsa_addprivs_heapSamba lsa_io_privilege_set Heap Overflow
auxiliary/dos/samba/lsa_transnames_heapSamba lsa_io_trans_names Heap Overflow
auxiliary/dos/samba/read_nttrans_ea_listSamba read_nttrans_ea_list Integer Overflow
auxiliary/dos/sap/sap_soap_rfc_eps_delete_fileSAP SOAP EPS_DELETE_FILE File Deletion
auxiliary/dos/scada/allen_bradley_pcccDoS Exploitation of Allen-Bradley's Legacy Protocol (PCCC)
auxiliary/dos/scada/beckhoff_twincatBeckhoff TwinCAT SCADA PLC 2.11.0.2004 DoS
auxiliary/dos/scada/d20_tftp_overflowGeneral Electric D20ME TFTP Server Buffer Overflow DoS
auxiliary/dos/scada/igss9_dataserver7-Technologies IGSS 9 IGSSdataServer.exe DoS
auxiliary/dos/scada/siemens_siprotec4Siemens SIPROTEC 4 and SIPROTEC Compact EN100 Ethernet Module - Denial of Service
auxiliary/dos/scada/yokogawa_logsvrYokogawa CENTUM CS 3000 BKCLogSvr.exe Heap Buffer Overflow
auxiliary/dos/smb/smb_lorisSMBLoris NBSS Denial of Service
auxiliary/dos/smtp/sendmail_prescanSendmail SMTP Address prescan Memory Corruption
auxiliary/dos/solaris/lpd/cascade_deleteSolaris LPD Arbitrary File Delete
auxiliary/dos/ssl/dtls_changecipherspecOpenSSL DTLS ChangeCipherSpec Remote DoS
auxiliary/dos/ssl/dtls_fragment_overflowOpenSSL DTLS Fragment Buffer Overflow DoS
auxiliary/dos/ssl/openssl_aesniOpenSSL TLS 1.1 and 1.2 AES-NI DoS
auxiliary/dos/syslog/rsyslog_long_tagrsyslog Long Tag Off-By-Two DoS
auxiliary/dos/tcp/claymore_dosClaymore Dual GPU Miner Format String dos attack
auxiliary/dos/tcp/junos_tcp_optJuniper JunOS Malformed TCP Option
auxiliary/dos/tcp/synfloodTCP SYN Flooder
auxiliary/dos/upnp/miniupnpd_dosMiniUPnPd 1.4 Denial of Service (DoS) Exploit
auxiliary/dos/windows/appian/appian_bpmAppian Enterprise Business Suite 5.6 SP1 DoS
auxiliary/dos/windows/browser/ms09_065_eot_integerMicrosoft Windows EOT Font Table Directory Integer Overflow
auxiliary/dos/windows/ftp/filezilla_admin_userFileZilla FTP Server Admin Interface Denial of Service
auxiliary/dos/windows/ftp/filezilla_server_portFileZilla FTP Server Malformed PORT Denial of Service
auxiliary/dos/windows/ftp/guildftp_cwdlistGuild FTPd 0.999.8.11/0.999.14 Heap Corruption
auxiliary/dos/windows/ftp/iis75_ftpd_iac_bofMicrosoft IIS FTP Server Encoded Response Overflow Trigger
auxiliary/dos/windows/ftp/iis_list_exhaustionMicrosoft IIS FTP Server LIST Stack Exhaustion
auxiliary/dos/windows/ftp/solarftp_userSolar FTP Server Malformed USER Denial of Service
auxiliary/dos/windows/ftp/titan626_siteTitan FTP Server 6.26.630 SITE WHO DoS
auxiliary/dos/windows/ftp/vicftps50_listVictory FTP Server 5.0 LIST DoS
auxiliary/dos/windows/ftp/winftp230_nlstWinFTP 2.3.0 NLST Denial of Service
auxiliary/dos/windows/ftp/xmeasy560_nlstXM Easy Personal FTP Server 5.6.0 NLST DoS
auxiliary/dos/windows/ftp/xmeasy570_nlstXM Easy Personal FTP Server 5.7.0 NLST DoS
auxiliary/dos/windows/games/kailleraKaillera 0.86 Server Denial of Service
auxiliary/dos/windows/http/http_sys_accept_encoding_dos_cve_2021_31166Windows IIS HTTP Protocol Stack DOS
auxiliary/dos/windows/http/ms10_065_ii6_asp_dosMicrosoft IIS 6.0 ASP Stack Exhaustion Denial of Service
auxiliary/dos/windows/http/pi3web_isapiPi3Web ISAPI DoS
auxiliary/dos/windows/llmnr/ms11_030_dnsapiMicrosoft Windows DNSAPI.dll LLMNR Buffer Underrun DoS
auxiliary/dos/windows/nat/nat_helperMicrosoft Windows NAT Helper Denial of Service
auxiliary/dos/windows/rdp/ms12_020_maxchannelidsMS12-020 Microsoft Remote Desktop Use-After-Free DoS
auxiliary/dos/windows/smb/ms05_047_pnpMicrosoft Plug and Play Service Registry Overflow
auxiliary/dos/windows/smb/ms06_035_mailslotMicrosoft SRV.SYS Mailslot Write Corruption
auxiliary/dos/windows/smb/ms06_063_transMicrosoft SRV.SYS Pipe Transaction No Null
auxiliary/dos/windows/smb/ms09_001_writeMicrosoft SRV.SYS WriteAndX Invalid DataOffset
auxiliary/dos/windows/smb/ms09_050_smb2_negotiate_pidhighMicrosoft SRV2.SYS SMB Negotiate ProcessID Function Table Dereference
auxiliary/dos/windows/smb/ms09_050_smb2_session_logoffMicrosoft SRV2.SYS SMB2 Logoff Remote Kernel NULL Pointer Dereference
auxiliary/dos/windows/smb/ms10_006_negotiate_response_loopMicrosoft Windows 7 / Server 2008 R2 SMB Client Infinite Loop
auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflowMicrosoft Windows SRV.SYS SrvSmbQueryFsInformation Pool Overflow DoS
auxiliary/dos/windows/smb/ms11_019_electbowserMicrosoft Windows Browser Pool DoS
auxiliary/dos/windows/smb/rras_vls_null_derefMicrosoft RRAS InterfaceAdjustVLSPointers NULL Dereference
auxiliary/dos/windows/smb/vista_negotiate_stopMicrosoft Vista SP0 SMB Negotiate Protocol DoS
auxiliary/dos/windows/smtp/ms06_019_exchangeMS06-019 Exchange MODPROP Heap Overflow
auxiliary/dos/windows/ssh/sysax_sshd_kexchangeSysax Multi-Server 6.10 SSHD Key Exchange Denial of Service
auxiliary/dos/windows/tftp/pt360_writePacketTrap TFTP Server 2.2.5459.0 DoS
auxiliary/dos/windows/tftp/solarwindsSolarWinds TFTP Server 10.4.0.10 Denial of Service
auxiliary/dos/wireshark/capwapWireshark CAPWAP Dissector DoS
auxiliary/dos/wireshark/chunkedWireshark chunked_encoding_dissector Function DOS
auxiliary/dos/wireshark/cldapWireshark CLDAP Dissector DOS
auxiliary/dos/wireshark/ldapWireshark LDAP Dissector DOS
auxiliary/fileformat/badpdfBADPDF Malicious PDF Creator
auxiliary/fileformat/multidropWindows SMB Multi Dropper
auxiliary/fileformat/odt_badodtLibreOffice 6.03 /Apache OpenOffice 4.1.5 Malicious ODT File Generator
auxiliary/fuzzers/dns/dns_fuzzerDNS and DNSSEC Fuzzer
auxiliary/fuzzers/ftp/client_ftpSimple FTP Client Fuzzer
auxiliary/fuzzers/ftp/ftp_pre_postSimple FTP Fuzzer
auxiliary/fuzzers/http/http_form_fieldHTTP Form Field Fuzzer
auxiliary/fuzzers/http/http_get_uri_longHTTP GET Request URI Fuzzer (Incrementing Lengths)
auxiliary/fuzzers/http/http_get_uri_stringsHTTP GET Request URI Fuzzer (Fuzzer Strings)
auxiliary/fuzzers/ntp/ntp_protocol_fuzzerNTP Protocol Fuzzer
auxiliary/fuzzers/smb/smb2_negotiate_corruptSMB Negotiate SMB2 Dialect Corruption
auxiliary/fuzzers/smb/smb_create_pipe_corruptSMB Create Pipe Request Corruption
auxiliary/fuzzers/smb/smb_create_pipeSMB Create Pipe Request Fuzzer
auxiliary/fuzzers/smb/smb_negotiate_corruptSMB Negotiate Dialect Corruption
auxiliary/fuzzers/smb/smb_ntlm1_login_corruptSMB NTLMv1 Login Request Corruption
auxiliary/fuzzers/smb/smb_tree_connect_corruptSMB Tree Connect Request Corruption
auxiliary/fuzzers/smb/smb_tree_connectSMB Tree Connect Request Fuzzer
auxiliary/fuzzers/smtp/smtp_fuzzerSMTP Simple Fuzzer
auxiliary/fuzzers/ssh/ssh_kexinit_corruptSSH Key Exchange Init Corruption
auxiliary/fuzzers/ssh/ssh_version_15SSH 1.5 Version Fuzzer
auxiliary/fuzzers/ssh/ssh_version_2SSH 2.0 Version Fuzzer
auxiliary/fuzzers/ssh/ssh_version_corruptSSH Version Corruption
auxiliary/fuzzers/tds/tds_login_corruptTDS Protocol Login Request Corruption Fuzzer
auxiliary/fuzzers/tds/tds_login_usernameTDS Protocol Login Request Username Fuzzer
auxiliary/gather/advantech_webaccess_credsAdvantech WebAccess 8.1 Post Authentication Credential Collector
auxiliary/gather/alienvault_iso27001_sqliAlienVault Authenticated SQL Injection Arbitrary File Read
auxiliary/gather/alienvault_newpolicyform_sqliAlienVault Authenticated SQL Injection Arbitrary File Read
auxiliary/gather/android_browser_file_theftAndroid Browser File Theft
auxiliary/gather/android_browser_new_tab_cookie_theftAndroid Browser "Open in New Tab" Cookie Theft
auxiliary/gather/android_htmlfileproviderAndroid Content Provider File Disclosure
auxiliary/gather/android_object_tag_webview_uxssAndroid Open Source Platform (AOSP) Browser UXSS
auxiliary/gather/android_stock_browser_uxssAndroid Open Source Platform (AOSP) Browser UXSS
auxiliary/gather/apache_rave_credsApache Rave User Information Disclosure
auxiliary/gather/apple_safari_ftp_url_cookie_theftApple OSX/iOS/Windows Safari Non-HTTPOnly Cookie Theft
auxiliary/gather/apple_safari_webarchive_uxssMac OS X Safari .webarchive File Format UXSS
auxiliary/gather/asterisk_credsAsterisk Gather Credentials
auxiliary/gather/avtech744_dvr_accountsAVTECH 744 DVR Account Information Retrieval
auxiliary/gather/billquick_txtid_sqliBillQuick Web Suite txtID SQLi
auxiliary/gather/browser_infoHTTP Client Information Gather
auxiliary/gather/browser_lanipleakHTTP Client LAN IP Address Gather
auxiliary/gather/c2s_dvr_password_disclosureC2S DVR Management Password Disclosure
auxiliary/gather/censys_searchCensys Search
auxiliary/gather/cerberus_helpdesk_hash_disclosureCerberus Helpdesk User Hash Disclosure
auxiliary/gather/checkpoint_hostnameCheckPoint Firewall-1 SecuRemote Topology Service Hostname Disclosure
auxiliary/gather/chrome_debuggerChrome Debugger Arbitrary File Read / Arbitrary Web Request
auxiliary/gather/cisco_pvc2300_download_configCisco PVC2300 POE Video Camera configuration download
auxiliary/gather/cisco_rv320_configCisco RV320/RV326 Configuration Disclosure
auxiliary/gather/citrix_published_applicationsCitrix MetaFrame ICA Published Applications Scanner
auxiliary/gather/citrix_published_bruteforceCitrix MetaFrame ICA Published Applications Bruteforcer
auxiliary/gather/cloud_lookupCloud Lookup (and Bypass)
auxiliary/gather/coldfusion_pwd_propsColdFusion 'password.properties' Hash Extraction
auxiliary/gather/corpwatch_lookup_idCorpWatch Company ID Information Search
auxiliary/gather/corpwatch_lookup_nameCorpWatch Company Name Information Search
auxiliary/gather/cve_2021_27850_apache_tapestry_hmac_keyApache Tapestry HMAC secret key leak
auxiliary/gather/d20passGeneral Electric D20 Password Recovery
auxiliary/gather/darkcomet_filedownloaderDarkComet Server Remote File Download Exploit
auxiliary/gather/dolibarr_creds_sqliDolibarr Gather Credentials via SQL Injection
auxiliary/gather/doliwamp_traversal_credsDoliWamp 'jqueryFileTree.php' Traversal Gather Credentials
auxiliary/gather/drupal_openid_xxeDrupal OpenID External Entity Injection
auxiliary/gather/eaton_nsm_credsNetwork Shutdown Module sort_values Credential Dumper
auxiliary/gather/emc_cta_xxeEMC CTA v10.0 Unauthenticated XXE Arbitrary File Read
auxiliary/gather/enum_dnsDNS Record Scanner and Enumerator
auxiliary/gather/eventlog_cred_disclosureManageEngine Eventlog Analyzer Managed Hosts Administrator Credential Disclosure
auxiliary/gather/exchange_proxylogon_collectorMicrosoft Exchange ProxyLogon Collector
auxiliary/gather/external_ipDiscover External IP via Ifconfig.me
auxiliary/gather/f5_bigip_cookie_disclosureF5 BigIP Backend Cookie Disclosure
auxiliary/gather/firefox_pdfjs_file_theftFirefox PDF.js Browser File Theft
auxiliary/gather/flash_rosetta_jsonp_url_disclosureFlash "Rosetta" JSONP GET/POST Response Disclosure
auxiliary/gather/fortios_vpnssl_traversal_creds_leakFortiOS Path Traversal Credential Gatherer
auxiliary/gather/get_user_spnsGather Ticket Granting Service (TGS) tickets for User Service Principal Names (SPN)
auxiliary/gather/grandstream_ucm62xx_sql_account_guessGrandstream UCM62xx IP PBX WebSocket Blind SQL Injection Credential Dump
auxiliary/gather/hikvision_info_disclosure_cve_2017_7921Unauthenticated information disclosure such as configuration, credentials and camera snapshots of a vulnerable Hikvision IP Camera
auxiliary/gather/hp_enum_perfdHP Operations Manager Perfd Environment Scanner
auxiliary/gather/hp_snac_domain_credsHP ProCurve SNAC Domain Controller Credential Dumper
auxiliary/gather/http_pdf_authorsGather PDF Authors
auxiliary/gather/huawei_wifi_infoHuawei Datacard Information Disclosure Vulnerability
auxiliary/gather/ibm_bigfix_sites_packages_enumIBM BigFix Relay Server Sites and Package Enum
auxiliary/gather/ibm_sametime_enumerate_usersIBM Lotus Notes Sametime User Enumeration
auxiliary/gather/ibm_sametime_room_bruteIBM Lotus Notes Sametime Room Name Bruteforce
auxiliary/gather/ibm_sametime_versionIBM Lotus Sametime Version Enumeration
auxiliary/gather/ie_sandbox_findfilesInternet Explorer Iframe Sandbox File Name Disclosure Vulnerability
auxiliary/gather/ie_uxss_injectionMS15-018 Microsoft Internet Explorer 10 and 11 Cross-Domain JavaScript Injection
auxiliary/gather/impersonate_sslHTTP SSL Certificate Impersonation
auxiliary/gather/ipcamera_password_disclosureJVC/Siemens/Vanderbilt IP-Camera Readfile Password Disclosure
auxiliary/gather/java_rmi_registryJava RMI Registry Interfaces Enumeration
auxiliary/gather/jenkins_cred_recoveryJenkins Domain Credential Recovery
auxiliary/gather/jetty_web_inf_disclosureJetty WEB-INF File Disclosure
auxiliary/gather/joomla_com_realestatemanager_sqliJoomla Real Estate Manager Component Error-Based SQL Injection
auxiliary/gather/joomla_contenthistory_sqliJoomla com_contenthistory Error-Based SQL Injection
auxiliary/gather/joomla_weblinks_sqliJoomla weblinks-categories Unauthenticated SQL Injection Arbitrary File Read
auxiliary/gather/kerberos_enumusersKerberos Domain User Enumeration
auxiliary/gather/konica_minolta_pwd_extractKonica Minolta Password Extractor
auxiliary/gather/lansweeper_collectorLansweeper Credential Collector
auxiliary/gather/ldap_esc_vulnerable_cert_finderMisconfigured Certificate Template Finder
auxiliary/gather/ldap_hashdumpLDAP Information Disclosure
auxiliary/gather/ldap_queryLDAP Query and Enumeration Module
auxiliary/gather/manageengine_adaudit_plus_xnode_enumManageEngine ADAudit Plus Xnode Enumeration
auxiliary/gather/manageengine_datasecurity_plus_xnode_enumManageEngine DataSecurity Plus Xnode Enumeration
auxiliary/gather/mantisbt_admin_sqliMantisBT Admin SQL Injection Arbitrary File Read
auxiliary/gather/mcafee_epo_xxeMcAfee ePolicy Orchestrator Authenticated XXE Credentials Exposure
auxiliary/gather/memcached_extractorMemcached Extractor
auxiliary/gather/microweber_lfiMicroweber CMS v1.2.10 Local File Inclusion (Authenticated)
auxiliary/gather/mikrotik_winbox_filereadMikrotik Winbox Arbitrary File Read
auxiliary/gather/mongodb_js_inject_collection_enumMongoDB NoSQL Collection Enumeration Via Injection
auxiliary/gather/ms14_052_xmldomMS14-052 Microsoft Internet Explorer XMLDOM Filename Disclosure
auxiliary/gather/mybb_db_fingerprintMyBB Database Fingerprint
auxiliary/gather/natpmp_external_addressNAT-PMP External Address Scanner
auxiliary/gather/netgear_password_disclosureNETGEAR Administrator Password Disclosure
auxiliary/gather/nis_bootparamd_domainNIS bootparamd Domain Name Disclosure
auxiliary/gather/nis_ypserv_mapNIS ypserv Map Dumper
auxiliary/gather/nuuo_cms_bruteforceNuuo Central Management Server User Session Token Bruteforce
auxiliary/gather/nuuo_cms_file_downloadNuuo Central Management Server Authenticated Arbitrary File Download
auxiliary/gather/oats_downloadservlet_traversalOracle Application Testing Suite Post-Auth DownloadServlet Directory Traversal
auxiliary/gather/office365userenumOffice 365 User Enumeration
auxiliary/gather/opennms_xxeOpenNMS Authenticated XXE
auxiliary/gather/peplink_bauth_sqliPeplink Balance routers SQLi
auxiliary/gather/pimcore_creds_sqliPimcore Gather Credentials via SQL Injection
auxiliary/gather/pulse_secure_file_disclosurePulse Secure VPN Arbitrary File Disclosure
auxiliary/gather/qnap_backtrace_admin_hashQNAP NAS/NVR Administrator Hash Disclosure
auxiliary/gather/qnap_lfiQNAP QTS and Photo Station Local File Inclusion
auxiliary/gather/rails_doubletap_file_readRuby On Rails File Content Disclosure ('doubletap')
auxiliary/gather/redis_extractorRedis Extractor
auxiliary/gather/safari_file_url_navigationMac OS X Safari file:// Redirection Sandbox Escape
auxiliary/gather/saltstack_salt_root_keySaltStack Salt Master Server Root Key Disclosure
auxiliary/gather/samsung_browser_sop_bypassSamsung Internet Browser SOP Bypass
auxiliary/gather/search_email_collectorSearch Engine Domain Email Address Collector
auxiliary/gather/searchengine_subdomains_collectorSearch Engine Subdomains Collector
auxiliary/gather/shodan_honeyscoreShodan Honeyscore Client
auxiliary/gather/shodan_hostShodan Host Port
auxiliary/gather/shodan_searchShodan Search
auxiliary/gather/snare_registrySnare Lite for Windows Registry Access
auxiliary/gather/solarwinds_orion_sqliSolarwinds Orion AccountManagement.asmx GetAccounts Admin Creation
auxiliary/gather/ssllabs_scanSSL Labs API Client
auxiliary/gather/suite_crm_export_sqliSuiteCRM authenticated SQL injection in export functionality
auxiliary/gather/teamtalk_credsTeamTalk Gather Credentials
auxiliary/gather/trackit_sql_domain_credsBMC / Numara Track-It! Domain Administrator and SQL Server User Password Disclosure
auxiliary/gather/vbulletin_getindexablecontent_sqlivBulletin /ajax/api/content_infraction/getIndexableContent nodeid Parameter SQL Injection
auxiliary/gather/vbulletin_vote_sqlivBulletin Password Collector via nodeid SQL Injection
auxiliary/gather/vmware_vcenter_vmdir_ldapVMware vCenter Server vmdir Information Disclosure
auxiliary/gather/windows_deployment_services_sharesMicrosoft Windows Deployment Services Unattend Gatherer
auxiliary/gather/windows_secrets_dumpWindows Secrets Dump
auxiliary/gather/wp_all_in_one_migration_exportWordPress All-in-One Migration Export
auxiliary/gather/wp_ultimate_csv_importer_user_extractWordPress Ultimate CSV Importer User Table Extract
auxiliary/gather/wp_w3_total_cache_hash_extractWordPress W3-Total-Cache Plugin 0.9.2.4 (or before) Username and Hash Extract
auxiliary/gather/xbmc_traversalXBMC Web Server Directory Traversal
auxiliary/gather/xerox_pwd_extractXerox Administrator Console Password Extractor
auxiliary/gather/xerox_workcentre_5xxx_ldapXerox Workcentre 5735 LDAP Service Redential Extractor
auxiliary/gather/xymon_infoXymon Daemon Gather Information
auxiliary/gather/zabbix_toggleids_sqliZabbix toggle_ids SQL Injection
auxiliary/gather/zookeeper_info_disclosureApache ZooKeeper Information Disclosure
auxiliary/gather/zoomeye_searchZoomEye Search
auxiliary/parser/unattendAuxilliary Parser Windows Unattend Passwords
auxiliary/pdf/foxit/authbypassFoxit Reader Authorization Bypass
auxiliary/scanner/acpp/loginApple Airport ACPP Authentication Scanner
auxiliary/scanner/afp/afp_loginApple Filing Protocol Login Utility
auxiliary/scanner/afp/afp_server_infoApple Filing Protocol Info Enumerator
auxiliary/scanner/backdoor/energizer_duo_detectEnergizer DUO Trojan Scanner
auxiliary/scanner/chargen/chargen_probeChargen Probe Utility
auxiliary/scanner/couchdb/couchdb_enumCouchDB Enum Utility
auxiliary/scanner/couchdb/couchdb_loginCouchDB Login Utility
auxiliary/scanner/db2/db2_authDB2 Authentication Brute Force Utility
auxiliary/scanner/db2/db2_versionDB2 Probe Utility
auxiliary/scanner/db2/discoveryDB2 Discovery Service Detection
auxiliary/scanner/dcerpc/dfscoerceDFSCoerce
auxiliary/scanner/dcerpc/endpoint_mapperEndpoint Mapper Service Discovery
auxiliary/scanner/dcerpc/hiddenHidden DCERPC Service Discovery
auxiliary/scanner/dcerpc/managementRemote Management Interface Discovery
auxiliary/scanner/dcerpc/petitpotamPetitPotam
auxiliary/scanner/dcerpc/tcp_dcerpc_auditorDCERPC TCP Service Auditor
auxiliary/scanner/dcerpc/windows_deployment_servicesMicrosoft Windows Deployment Services Unattend Retrieval
auxiliary/scanner/dect/call_scannerDECT Call Scanner
auxiliary/scanner/dect/station_scannerDECT Base Station Scanner
auxiliary/scanner/discovery/arp_sweepARP Sweep Local Network Discovery
auxiliary/scanner/discovery/empty_udpUDP Empty Prober
auxiliary/scanner/discovery/ipv6_multicast_pingIPv6 Link Local/Node Local Ping Discovery
auxiliary/scanner/discovery/ipv6_neighborIPv6 Local Neighbor Discovery
auxiliary/scanner/discovery/ipv6_neighbor_router_advertisementIPv6 Local Neighbor Discovery Using Router Advertisement
auxiliary/scanner/discovery/udp_probeUDP Service Prober
auxiliary/scanner/discovery/udp_sweepUDP Service Sweeper
auxiliary/scanner/dlsw/dlsw_leak_captureCisco DLSw Information Disclosure Scanner
auxiliary/scanner/dns/dns_ampDNS Amplification Scanner
auxiliary/scanner/elasticsearch/indices_enumElasticSearch Indices Enumeration Utility
auxiliary/scanner/emc/alphastor_devicemanagerEMC AlphaStor Device Manager Service
auxiliary/scanner/emc/alphastor_librarymanagerEMC AlphaStor Library Manager Service
auxiliary/scanner/etcd/open_key_scannerEtcd Keys API Information Gathering
auxiliary/scanner/etcd/versionEtcd Version Scanner
auxiliary/scanner/finger/finger_usersFinger Service User Enumerator
auxiliary/scanner/ftp/anonymousAnonymous FTP Access Detection
auxiliary/scanner/ftp/bison_ftp_traversalBisonWare BisonFTP Server 3.5 Directory Traversal Information Disclosure
auxiliary/scanner/ftp/colorado_ftp_traversalColoradoFTP Server 1.3 Build 8 Directory Traversal Information Disclosure
auxiliary/scanner/ftp/easy_file_sharing_ftpEasy File Sharing FTP Server 3.6 Directory Traversal
auxiliary/scanner/ftp/ftp_loginFTP Authentication Scanner
auxiliary/scanner/ftp/ftp_versionFTP Version Scanner
auxiliary/scanner/ftp/konica_ftp_traversalKonica Minolta FTP Utility 1.00 Directory Traversal Information Disclosure
auxiliary/scanner/ftp/pcman_ftp_traversalPCMan FTP Server 2.0.7 Directory Traversal Information Disclosure
auxiliary/scanner/ftp/titanftp_xcrc_traversalTitan FTP XCRC Directory Traversal Information Disclosure
auxiliary/scanner/gopher/gopher_gophermapGopher gophermap Scanner
auxiliary/scanner/gprs/gtp_echoGTP Echo Scanner
auxiliary/scanner/h323/h323_versionH.323 Version Scanner
auxiliary/scanner/http/a10networks_ax_directory_traversalA10 Networks AX Loadbalancer Directory Traversal
auxiliary/scanner/http/accellion_fta_statecode_file_readAccellion FTA 'statecode' Cookie Arbitrary File Read
auxiliary/scanner/http/adobe_xml_injectAdobe XML External Entity Injection
auxiliary/scanner/http/advantech_webaccess_loginAdvantech WebAccess Login
auxiliary/scanner/http/allegro_rompager_misfortune_cookieAllegro Software RomPager 'Misfortune Cookie' (CVE-2014-9222) Scanner
auxiliary/scanner/http/apache_activemq_source_disclosureApache ActiveMQ JSP Files Source Disclosure
auxiliary/scanner/http/apache_activemq_traversalApache ActiveMQ Directory Traversal
auxiliary/scanner/http/apache_flink_jobmanager_traversalApache Flink JobManager Traversal
auxiliary/scanner/http/apache_mod_cgi_bash_envApache mod_cgi Bash Environment Variable Injection (Shellshock) Scanner
auxiliary/scanner/http/apache_normalize_pathApache 2.4.49/2.4.50 Traversal RCE scanner
auxiliary/scanner/http/apache_optionsbleedApache Optionsbleed Scanner
auxiliary/scanner/http/apache_userdir_enumApache "mod_userdir" User Enumeration
auxiliary/scanner/http/appletv_loginAppleTV AirPlay Login Utility
auxiliary/scanner/http/atlassian_crowd_fileaccessAtlassian Crowd XML Entity Expansion Remote File Access
auxiliary/scanner/http/axis_local_file_includeApache Axis2 v1.4.1 Local File Inclusion
auxiliary/scanner/http/axis_loginApache Axis2 Brute Force Utility
auxiliary/scanner/http/azure_ad_loginMicrosoft Azure Active Directory Login Enumeration
auxiliary/scanner/http/backup_fileHTTP Backup File Scanner
auxiliary/scanner/http/barracuda_directory_traversalBarracuda Multiple Product "locale" Directory Traversal
auxiliary/scanner/http/bavision_cam_loginBAVision IP Camera Web Server Login
auxiliary/scanner/http/binom3_login_config_pass_dumpBinom3 Web Management Login Scanner, Config and Password File Dump
auxiliary/scanner/http/bitweaver_overlay_type_traversalBitweaver overlay_type Directory Traversal
auxiliary/scanner/http/blind_sql_queryHTTP Blind SQL Injection Scanner
auxiliary/scanner/http/bmc_trackit_passwd_resetBMC TrackIt! Unauthenticated Arbitrary User Password Change
auxiliary/scanner/http/brute_dirsHTTP Directory Brute Force Scanner
auxiliary/scanner/http/buffalo_loginBuffalo NAS Login Utility
auxiliary/scanner/http/buildmaster_loginInedo BuildMaster Login Scanner
auxiliary/scanner/http/caidao_bruteforce_loginChinese Caidao Backdoor Bruteforce
auxiliary/scanner/http/canon_wirelessCanon Printer Wireless Configuration Disclosure
auxiliary/scanner/http/cassandra_web_file_readCassandra Web File Read Vulnerability
auxiliary/scanner/http/certHTTP SSL Certificate Checker
auxiliary/scanner/http/cgit_traversalcgit Directory Traversal
auxiliary/scanner/http/chef_webui_loginChef Web UI Brute Force Utility
auxiliary/scanner/http/chromecast_webserverChromecast Web Server Scanner
auxiliary/scanner/http/chromecast_wifiChromecast Wifi Enumeration
auxiliary/scanner/http/cisco_asa_asdm_bruteforceCisco ASA ASDM Brute-force Login
auxiliary/scanner/http/cisco_asa_asdmCisco ASA ASDM Bruteforce Login Utility
auxiliary/scanner/http/cisco_asa_clientless_vpnCisco ASA Clientless SSL VPN (WebVPN) Brute-force Login Utility
auxiliary/scanner/http/cisco_device_managerCisco Device HTTP Device Manager Access
auxiliary/scanner/http/cisco_directory_traversalCisco ASA Directory Traversal
auxiliary/scanner/http/cisco_firepower_downloadCisco Firepower Management Console 6.0 Post Auth Report Download Directory Traversal
auxiliary/scanner/http/cisco_firepower_loginCisco Firepower Management Console 6.0 Login
auxiliary/scanner/http/cisco_ios_auth_bypassCisco IOS HTTP Unauthorized Administrative Access
auxiliary/scanner/http/cisco_ironport_enumCisco Ironport Bruteforce Login Utility
auxiliary/scanner/http/cisco_nac_manager_traversalCisco Network Access Manager Directory Traversal Vulnerability
auxiliary/scanner/http/cisco_ssl_vpnCisco SSL VPN Bruteforce Login Utility
auxiliary/scanner/http/cisco_ssl_vpn_priv_escCisco ASA SSL VPN Privilege Escalation Vulnerability
auxiliary/scanner/http/citrix_dir_traversalCitrix ADC (NetScaler) Directory Traversal Scanner
auxiliary/scanner/http/clansphere_traversalClanSphere 2011.3 Local File Inclusion Vulnerability
auxiliary/scanner/http/cnpilot_r_web_login_lootCambium cnPilot r200/r201 Login Scanner and Config Dump
auxiliary/scanner/http/coldfusion_locale_traversalColdFusion Server Check
auxiliary/scanner/http/coldfusion_versionColdFusion Version Scanner
auxiliary/scanner/http/concrete5_member_listConcrete5 Member List Enumeration
auxiliary/scanner/http/copy_of_fileHTTP Copy File Scanner
auxiliary/scanner/http/crawlerWeb Site Crawler
auxiliary/scanner/http/dell_idracDell iDRAC Default Login
auxiliary/scanner/http/dicoogle_traversalDicoogle PACS Web Server Directory Traversal
auxiliary/scanner/http/directadmin_loginDirectAdmin Web Control Panel Login Utility
auxiliary/scanner/http/dir_listingHTTP Directory Listing Scanner
auxiliary/scanner/http/dir_scannerHTTP Directory Scanner
auxiliary/scanner/http/dir_webdav_unicode_bypassMS09-020 IIS6 WebDAV Unicode Auth Bypass Directory Scanner
auxiliary/scanner/http/dlink_dir_300_615_http_loginD-Link DIR-300A / DIR-320 / DIR-615D HTTP Login Utility
auxiliary/scanner/http/dlink_dir_615h_http_loginD-Link DIR-615H HTTP Login Utility
auxiliary/scanner/http/dlink_dir_session_cgi_http_loginD-Link DIR-300B / DIR-600B / DIR-815 / DIR-645 HTTP Login Utility
auxiliary/scanner/http/dlink_user_agent_backdoorD-Link User-Agent Backdoor Scanner
auxiliary/scanner/http/dnalims_file_retrieveDnaLIMS Directory Traversal
auxiliary/scanner/http/docker_versionDocker Server Version Scanner
auxiliary/scanner/http/dolibarr_loginDolibarr ERP/CRM Login Utility
auxiliary/scanner/http/drupal_views_user_enumDrupal Views Module Users Enumeration
auxiliary/scanner/http/ektron_cms400netEktron CMS400.NET Default Password Scanner
auxiliary/scanner/http/elasticsearch_traversalElasticSearch Snapshot API Directory Traversal
auxiliary/scanner/http/emby_ssrf_scannerEmby SSRF HTTP Scanner
auxiliary/scanner/http/emby_version_ssrfEmby Version Scanner
auxiliary/scanner/http/enum_waybackArchive.org Stored Domain URLs
auxiliary/scanner/http/epmp1000_dump_configCambium ePMP 1000 Dump Device Config
auxiliary/scanner/http/epmp1000_dump_hashesCambium ePMP 1000 'ping' Password Hash Extractor (up to v2.5)
auxiliary/scanner/http/epmp1000_get_chart_cmd_execCambium ePMP 1000 'get_chart' Command Injection (v3.1-3.5-RC7)
auxiliary/scanner/http/epmp1000_ping_cmd_execCambium ePMP 1000 'ping' Command Injection (up to v2.5)
auxiliary/scanner/http/epmp1000_reset_passCambium ePMP 1000 Account Password Reset
auxiliary/scanner/http/epmp1000_web_loginCambium ePMP 1000 Login Scanner
auxiliary/scanner/http/error_sql_injectionHTTP Error Based SQL Injection Scanner
auxiliary/scanner/http/es_file_explorer_open_portES File Explorer Open Port
auxiliary/scanner/http/etherpad_duo_loginEtherPAD Duo Login Bruteforce Utility
auxiliary/scanner/http/exchange_proxylogonMicrosoft Exchange ProxyLogon Scanner
auxiliary/scanner/http/exchange_web_server_pushsubscriptionMicrosoft Exchange Privilege Escalation Exploit
auxiliary/scanner/http/f5_bigip_virtual_serverF5 BigIP HTTP Virtual Server Scanner
auxiliary/scanner/http/f5_mgmt_scannerF5 Networks Devices Management Interface Scanner
auxiliary/scanner/http/file_same_name_dirHTTP File Same Name Directory Scanner
auxiliary/scanner/http/files_dirHTTP Interesting File Scanner
auxiliary/scanner/http/fortimail_login_bypass_detectionFortiMail Unauthenticated Login Bypass Scanner
auxiliary/scanner/http/fortinet_ssl_vpnFortinet SSL VPN Bruteforce Login Utility
auxiliary/scanner/http/frontpage_credential_dumpFrontPage .pwd File Credential Dump
auxiliary/scanner/http/frontpage_loginFrontPage Server Extensions Anonymous Login Scanner
auxiliary/scanner/http/gavazzi_em_login_lootCarlo Gavazzi Energy Meters - Login Brute Force, Extract Info and Dump Plant Database
auxiliary/scanner/http/gitlab_graphql_user_enumGitLab GraphQL API User Enumeration
auxiliary/scanner/http/gitlab_loginGitLab Login Utility
auxiliary/scanner/http/gitlab_user_enumGitLab User Enumeration
auxiliary/scanner/http/git_scannerHTTP Git Scanner
auxiliary/scanner/http/glassfish_loginGlassFish Brute Force Utility
auxiliary/scanner/http/glassfish_traversalPath Traversal in Oracle GlassFish Server Open Source Edition
auxiliary/scanner/http/goahead_traversalEmbedthis GoAhead Embedded Web Server Directory Traversal
auxiliary/scanner/http/grafana_plugin_traversalGrafana Plugin Path Traversal
auxiliary/scanner/http/groupwise_agents_http_traversalNovell Groupwise Agents HTTP Directory Traversal
auxiliary/scanner/http/host_header_injectionHTTP Host Header Injection Detection
auxiliary/scanner/http/hp_imc_bims_downloadservlet_traversalHP Intelligent Management BIMS DownloadServlet Directory Traversal
auxiliary/scanner/http/hp_imc_faultdownloadservlet_traversalHP Intelligent Management FaultDownloadServlet Directory Traversal
auxiliary/scanner/http/hp_imc_ictdownloadservlet_traversalHP Intelligent Management IctDownloadServlet Directory Traversal
auxiliary/scanner/http/hp_imc_reportimgservlt_traversalHP Intelligent Management ReportImgServlt Directory Traversal
auxiliary/scanner/http/hp_imc_som_file_downloadHP Intelligent Management SOM FileDownloadServlet Arbitrary Download
auxiliary/scanner/http/hp_sitescope_getfileinternal_fileaccessHP SiteScope SOAP Call getFileInternal Remote File Access
auxiliary/scanner/http/hp_sitescope_getsitescopeconfigurationHP SiteScope SOAP Call getSiteScopeConfiguration Configuration Access
auxiliary/scanner/http/hp_sitescope_loadfilecontent_fileaccessHP SiteScope SOAP Call loadFileContent Remote File Access
auxiliary/scanner/http/hp_sys_mgmt_loginHP System Management Homepage Login Utility
auxiliary/scanner/http/httpbl_lookupHttp:BL Lookup
auxiliary/scanner/http/httpdasm_directory_traversalHttpdasm Directory Traversal
auxiliary/scanner/http/http_headerHTTP Header Detection
auxiliary/scanner/http/http_hstsHTTP Strict Transport Security (HSTS) Detection
auxiliary/scanner/http/http_loginHTTP Login Utility
auxiliary/scanner/http/http_putHTTP Writable Path PUT/DELETE File Access
auxiliary/scanner/http/http_sickrage_password_leakHTTP SickRage Password Leak
auxiliary/scanner/http/http_traversalGeneric HTTP Directory Traversal Utility
auxiliary/scanner/http/http_versionHTTP Version Detection
auxiliary/scanner/http/iis_internal_ipMicrosoft IIS HTTP Internal IP Disclosure
auxiliary/scanner/http/iis_shortname_scannerMicrosoft IIS shortname vulnerability scanner
auxiliary/scanner/http/influxdb_enumInfluxDB Enum Utility
auxiliary/scanner/http/infovista_enumInfoVista VistaPortal Application Bruteforce Login Utility
auxiliary/scanner/http/intel_amt_digest_bypassIntel AMT Digest Authentication Bypass Scanner
auxiliary/scanner/http/ipboard_loginIP Board Login Auxiliary Module
auxiliary/scanner/http/jboss_statusJBoss Status Servlet Information Gathering
auxiliary/scanner/http/jboss_vulnscanJBoss Vulnerability Scanner
auxiliary/scanner/http/jenkins_commandJenkins-CI Unauthenticated Script-Console Scanner
auxiliary/scanner/http/jenkins_enumJenkins-CI Enumeration
auxiliary/scanner/http/jenkins_loginJenkins-CI Login Utility
auxiliary/scanner/http/jira_user_enumJira Users Enumeration
auxiliary/scanner/http/joomla_bruteforce_loginJoomla Bruteforce Login Utility
auxiliary/scanner/http/joomla_ecommercewd_sqli_scannerWeb-Dorado ECommerce WD for Joomla! search_category_id SQL Injection Scanner
auxiliary/scanner/http/joomla_gallerywd_sqli_scannerGallery WD for Joomla! Unauthenticated SQL Injection Scanner
auxiliary/scanner/http/joomla_pagesJoomla Page Scanner
auxiliary/scanner/http/joomla_pluginsJoomla Plugins Scanner
auxiliary/scanner/http/joomla_versionJoomla Version Scanner
auxiliary/scanner/http/jupyter_loginJupyter Login Utility
auxiliary/scanner/http/kodi_traversalKodi 17.0 Local File Inclusion Vulnerability
auxiliary/scanner/http/limesurvey_zip_traversalsLimeSurvey Zip Path Traversals
auxiliary/scanner/http/linknat_vos_traversalLinknat Vos Manager Traversal
auxiliary/scanner/http/linksys_e1500_traversalLinksys E1500 Directory Traversal Vulnerability
auxiliary/scanner/http/litespeed_source_disclosureLiteSpeed Source Code Disclosure/Download
auxiliary/scanner/http/log4shell_scannerLog4Shell HTTP Scanner
auxiliary/scanner/http/lucky_punchHTTP Microsoft SQL Injection Table XSS Infection
auxiliary/scanner/http/majordomo2_directory_traversalMajordomo2 _list_file_get() Directory Traversal
auxiliary/scanner/http/manageengine_desktop_central_loginManageEngine Desktop Central Login Utility
auxiliary/scanner/http/manageengine_deviceexpert_traversalManageEngine DeviceExpert 5.6 ScheduleResultViewer FileName Traversal
auxiliary/scanner/http/manageengine_deviceexpert_user_credsManageEngine DeviceExpert User Credentials
auxiliary/scanner/http/manageengine_securitymanager_traversalManageEngine SecurityManager Plus 5.5 Directory Traversal
auxiliary/scanner/http/mediawiki_svg_fileaccessMediaWiki SVG XML Entity Expansion Remote File Access
auxiliary/scanner/http/meteocontrol_weblog_extractadminMeteocontrol WEBlog Password Extractor
auxiliary/scanner/http/mod_negotiation_bruteApache HTTPD mod_negotiation Filename Bruter
auxiliary/scanner/http/mod_negotiation_scannerApache HTTPD mod_negotiation Scanner
auxiliary/scanner/http/ms09_020_webdav_unicode_bypassMS09-020 IIS6 WebDAV Unicode Authentication Bypass
auxiliary/scanner/http/ms15_034_http_sys_memory_dumpMS15-034 HTTP Protocol Stack Request Handling HTTP.SYS Memory Information Disclosure
auxiliary/scanner/http/mybook_live_loginWestern Digital MyBook Live Login Utility
auxiliary/scanner/http/nagios_xi_scannerNagios XI Scanner
auxiliary/scanner/http/netdecision_traversalNetDecision NOCVision Server Directory Traversal
auxiliary/scanner/http/netgear_sph200d_traversalNetgear SPH200D Directory Traversal Vulnerability
auxiliary/scanner/http/nginx_source_disclosureNginx Source Code Disclosure/Download
auxiliary/scanner/http/novell_file_reporter_fsfui_fileaccessNFR Agent FSFUI Record Arbitrary Remote File Access
auxiliary/scanner/http/novell_file_reporter_srs_fileaccessNFR Agent SRS Record Arbitrary Remote File Access
auxiliary/scanner/http/novell_mdm_credsNovell Zenworks Mobile Device Managment Admin Credentials
auxiliary/scanner/http/ntlm_info_enumerationHost Information Enumeration via NTLM Authentication
auxiliary/scanner/http/octopusdeploy_loginOctopus Deploy Login Utility
auxiliary/scanner/http/onion_omega2_loginOnion Omega2 Login Brute-Force
auxiliary/scanner/http/openmind_messageos_loginOpenMind Message-OS Portal Login Brute Force Utility
auxiliary/scanner/http/open_proxyHTTP Open Proxy Detection
auxiliary/scanner/http/optionsHTTP Options Detection
auxiliary/scanner/http/oracle_demantra_database_credentials_leakOracle Demantra Database Credentials Leak
auxiliary/scanner/http/oracle_demantra_file_retrievalOracle Demantra Arbitrary File Retrieval with Authentication Bypass
auxiliary/scanner/http/oracle_ilom_loginOracle ILO Manager Login Brute Force Utility
auxiliary/scanner/http/owa_ews_loginOWA Exchange Web Services (EWS) Login Scanner
auxiliary/scanner/http/owa_iis_internal_ipOutlook Web App (OWA) / Client Access Server (CAS) IIS HTTP Internal IP Disclosure
auxiliary/scanner/http/owa_loginOutlook Web App (OWA) Brute Force Utility
auxiliary/scanner/http/phpmyadmin_loginPhpMyAdmin Login Scanner
auxiliary/scanner/http/pocketpad_loginPocketPAD Login Bruteforce Force Utility
auxiliary/scanner/http/prev_dir_same_name_fileHTTP Previous Directory File Scanner
auxiliary/scanner/http/radware_appdirector_enumRadware AppDirector Bruteforce Login Utility
auxiliary/scanner/http/rails_json_yaml_scannerRuby on Rails JSON Processor YAML Deserialization Scanner
auxiliary/scanner/http/rails_mass_assignmentRuby On Rails Attributes Mass Assignment Scanner
auxiliary/scanner/http/rails_xml_yaml_scannerRuby on Rails XML Processor YAML Deserialization Scanner
auxiliary/scanner/http/rdp_web_loginMicrosoft RDP Web Client Login Enumeration
auxiliary/scanner/http/replace_extHTTP File Extension Scanner
auxiliary/scanner/http/rewrite_proxy_bypassApache Reverse Proxy Bypass Vulnerability Scanner
auxiliary/scanner/http/rfcode_reader_enumRFCode Reader Web Interface Login / Bruteforce Utility
auxiliary/scanner/http/rips_traversalRIPS Scanner Directory Traversal
auxiliary/scanner/http/riverbed_steelhead_vcx_file_readRiverbed SteelHead VCX File Read
auxiliary/scanner/http/robots_txtHTTP Robots.txt Content Scanner
auxiliary/scanner/http/s40_traversalS40 0.4.2 CMS Directory Traversal Vulnerability
auxiliary/scanner/http/sap_businessobjects_user_bruteSAP BusinessObjects User Bruteforcer
auxiliary/scanner/http/sap_businessobjects_user_brute_webSAP BusinessObjects Web User Bruteforcer
auxiliary/scanner/http/sap_businessobjects_user_enumSAP BusinessObjects User Enumeration
auxiliary/scanner/http/sap_businessobjects_version_enumSAP BusinessObjects Version Detection
auxiliary/scanner/http/scraperHTTP Page Scraper
auxiliary/scanner/http/sentry_cdu_enumSentry Switched CDU Bruteforce Login Utility
auxiliary/scanner/http/servicedesk_plus_traversalManageEngine ServiceDesk Plus Path Traversal
auxiliary/scanner/http/sevone_enumSevOne Network Performance Management Application Brute Force Login Utility
auxiliary/scanner/http/simple_webserver_traversalSimple Web Server 2.3-RC1 Directory Traversal
auxiliary/scanner/http/smt_ipmi_49152_exposureSupermicro Onboard IPMI Port 49152 Sensitive File Exposure
auxiliary/scanner/http/smt_ipmi_cgi_scannerSupermicro Onboard IPMI CGI Vulnerability Scanner
auxiliary/scanner/http/smt_ipmi_static_cert_scannerSupermicro Onboard IPMI Static SSL Certificate Scanner
auxiliary/scanner/http/smt_ipmi_url_redirect_traversalSupermicro Onboard IPMI url_redirect.cgi Authenticated Directory Traversal
auxiliary/scanner/http/soap_xmlHTTP SOAP Verb/Noun Brute Force Scanner
auxiliary/scanner/http/sockso_traversalSockso Music Host Server 1.5 Directory Traversal
auxiliary/scanner/http/splunk_web_loginSplunk Web Interface Login Utility
auxiliary/scanner/http/springcloud_directory_traversalDirectory Traversal in Spring Cloud Config Server
auxiliary/scanner/http/springcloud_traversalSpring Cloud Config Server Directory Traversal
auxiliary/scanner/http/squid_pivot_scanningSquid Proxy Port Scanner
auxiliary/scanner/http/squiz_matrix_user_enumSquiz Matrix User Enumeration Scanner
auxiliary/scanner/http/sslHTTP SSL Certificate Information
auxiliary/scanner/http/ssl_versionHTTP SSL/TLS Version Detection (POODLE scanner)
auxiliary/scanner/http/support_center_plus_directory_traversalManageEngine Support Center Plus Directory Traversal
auxiliary/scanner/http/surgenews_user_credsSurgeNews User Credentials
auxiliary/scanner/http/svn_scannerHTTP Subversion Scanner
auxiliary/scanner/http/svn_wcdb_scannerSVN wc.db Scanner
auxiliary/scanner/http/sybase_easerver_traversalSybase Easerver 6.3 Directory Traversal
auxiliary/scanner/http/symantec_brightmail_ldapcredsSymantec Messaging Gateway 10 Exposure of Stored AD Password Vulnerability
auxiliary/scanner/http/symantec_brightmail_logfileSymantec Messaging Gateway 9.5 Log File Download Vulnerability
auxiliary/scanner/http/symantec_web_gateway_loginSymantec Web Gateway Login Utility
auxiliary/scanner/http/synology_forget_passwd_user_enumSynology Forget Password User Enumeration Scanner
auxiliary/scanner/http/thinvnc_traversalThinVNC Directory Traversal
auxiliary/scanner/http/titan_ftp_admin_pwdTitan FTP Administrative Password Disclosure
auxiliary/scanner/http/titleHTTP HTML Title Tag Content Grabber
auxiliary/scanner/http/tomcat_enumApache Tomcat User Enumeration
auxiliary/scanner/http/tomcat_mgr_loginTomcat Application Manager Login Utility
auxiliary/scanner/http/totaljs_traversalTotal.js prior to 3.2.4 Directory Traversal
auxiliary/scanner/http/tplink_traversal_noauthTP-Link Wireless Lite N Access Point Directory Traversal Vulnerability
auxiliary/scanner/http/trace_axdHTTP trace.axd Content Scanner
auxiliary/scanner/http/traceHTTP Cross-Site Tracing Detection
auxiliary/scanner/http/tvt_nvms_traversalTVT NVMS-1000 Directory Traversal
auxiliary/scanner/http/typo3_bruteforceTypo3 Login Bruteforcer
auxiliary/scanner/http/vcms_loginV-CMS Login Utility
auxiliary/scanner/http/verb_auth_bypassHTTP Verb Authentication Bypass Scanner
auxiliary/scanner/http/vhost_scannerHTTP Virtual Host Brute Force Scanner
auxiliary/scanner/http/vicidial_multiple_sqliVICIdial Multiple Authenticated SQLi
auxiliary/scanner/http/wangkongbao_traversalWANGKONGBAO CNS-1000 and 1100 UTM Directory Traversal
auxiliary/scanner/http/webdav_internal_ipHTTP WebDAV Internal IP Scanner
auxiliary/scanner/http/webdav_scannerHTTP WebDAV Scanner
auxiliary/scanner/http/webdav_website_contentHTTP WebDAV Website Content Scanner
auxiliary/scanner/http/webpagetest_traversalWebPageTest Directory Traversal
auxiliary/scanner/http/web_vulndbHTTP Vuln Scanner
auxiliary/scanner/http/wildfly_traversalWildFly Directory Traversal
auxiliary/scanner/http/wordpress_content_injectionWordPress REST API Content Injection
auxiliary/scanner/http/wordpress_cp_calendar_sqliWordPress CP Multi-View Calendar Unauthenticated SQL Injection Scanner
auxiliary/scanner/http/wordpress_ghost_scannerWordPress XMLRPC GHOST Vulnerability Scanner
auxiliary/scanner/http/wordpress_login_enumWordPress Brute Force and User Enumeration Utility
auxiliary/scanner/http/wordpress_multicall_credsWordpress XML-RPC system.multicall Credential Collector
auxiliary/scanner/http/wordpress_pingback_accessWordpress Pingback Locator
auxiliary/scanner/http/wordpress_scannerWordpress Scanner
auxiliary/scanner/http/wordpress_xmlrpc_loginWordpress XML-RPC Username/Password Login Scanner
auxiliary/scanner/http/wp_abandoned_cart_sqliAbandoned Cart for WooCommerce SQLi Scanner
auxiliary/scanner/http/wp_arbitrary_file_deletionWordpress Arbitrary File Deletion
auxiliary/scanner/http/wp_bulletproofsecurity_backupsWordpress BulletProof Security Backup Disclosure
auxiliary/scanner/http/wp_chopslider_id_sqliWordPress ChopSlider3 id SQLi Scanner
auxiliary/scanner/http/wp_contus_video_gallery_sqliWordPress Contus Video Gallery Unauthenticated SQL Injection Scanner
auxiliary/scanner/http/wp_dukapress_file_readWordPress DukaPress Plugin File Read Vulnerability
auxiliary/scanner/http/wp_duplicator_file_readWordPress Duplicator File Read Vulnerability
auxiliary/scanner/http/wp_easy_wp_smtpWordPress Easy WP SMTP Password Reset
auxiliary/scanner/http/wp_email_sub_news_sqliWordPress Email Subscribers and Newsletter Hash SQLi Scanner
auxiliary/scanner/http/wp_gimedia_library_file_readWordPress GI-Media Library Plugin Directory Traversal Vulnerability
auxiliary/scanner/http/wp_learnpress_sqliWordpress LearnPress current_items Authenticated SQLi
auxiliary/scanner/http/wp_loginizer_log_sqliWordPress Loginizer log SQLi Scanner
auxiliary/scanner/http/wp_mobileedition_file_readWordPress Mobile Edition File Read Vulnerability
auxiliary/scanner/http/wp_mobile_pack_info_disclosureWordPress Mobile Pack Information Disclosure Vulnerability
auxiliary/scanner/http/wp_modern_events_calendar_sqliWordPress Modern Events Calendar SQLi Scanner
auxiliary/scanner/http/wp_nextgen_galley_file_readWordPress NextGEN Gallery Directory Read Vulnerability
auxiliary/scanner/http/wp_registrationmagic_sqliWordpress RegistrationMagic task_ids Authenticated SQLi
auxiliary/scanner/http/wp_secure_copy_content_protection_sqliWordpress Secure Copy Content Protection and Content Locking sccp_id Unauthenticated SQLi
auxiliary/scanner/http/wp_simple_backup_file_readWordPress Simple Backup File Read Vulnerability
auxiliary/scanner/http/wp_subscribe_comments_file_readWordPress Subscribe Comments File Read Vulnerability
auxiliary/scanner/http/wp_total_upkeep_downloaderWordPress Total Upkeep Unauthenticated Backup Downloader
auxiliary/scanner/http/wp_wps_hide_login_revealerWordPress WPS Hide Login Login Page Revealer
auxiliary/scanner/http/xpathHTTP Blind XPATH 1.0 Injector
auxiliary/scanner/http/yaws_traversalYaws Web Server Directory Traversal
auxiliary/scanner/http/zabbix_loginZabbix Server Brute Force Utility
auxiliary/scanner/http/zenload_balancer_traversalZen Load Balancer Directory Traversal
auxiliary/scanner/http/zenworks_assetmanagement_fileaccessNovell ZENworks Asset Management 7.5 Remote File Access
auxiliary/scanner/http/zenworks_assetmanagement_getconfigNovell ZENworks Asset Management 7.5 Configuration Access
auxiliary/scanner/ike/cisco_ike_benigncertainCisco IKE Information Disclosure
auxiliary/scanner/imap/imap_versionIMAP4 Banner Grabber
auxiliary/scanner/ip/ipidseqIPID Sequence Scanner
auxiliary/scanner/ipmi/ipmi_cipher_zeroIPMI 2.0 Cipher Zero Authentication Bypass Scanner
auxiliary/scanner/ipmi/ipmi_dumphashesIPMI 2.0 RAKP Remote SHA1 Password Hash Retrieval
auxiliary/scanner/ipmi/ipmi_versionIPMI Information Discovery
auxiliary/scanner/jenkins/jenkins_udp_broadcast_enumJenkins Server Broadcast Enumeration
auxiliary/scanner/kademlia/server_infoGather Kademlia Server Information
auxiliary/scanner/llmnr/queryLLMNR Query
auxiliary/scanner/lotus/lotus_domino_hashesLotus Domino Password Hash Collector
auxiliary/scanner/lotus/lotus_domino_loginLotus Domino Brute Force Utility
auxiliary/scanner/lotus/lotus_domino_versionLotus Domino Version
auxiliary/scanner/mdns/querymDNS Query
auxiliary/scanner/memcached/memcached_ampMemcached Stats Amplification Scanner
auxiliary/scanner/memcached/memcached_udp_versionMemcached UDP Version Scanner
auxiliary/scanner/misc/cctv_dvr_loginCCTV DVR Login Scanning Utility
auxiliary/scanner/misc/cisco_smart_installIdentify Cisco Smart Install endpoints
auxiliary/scanner/misc/clamav_controlClamAV Remote Command Transmitter
auxiliary/scanner/misc/dahua_dvr_auth_bypassDahua DVR Auth Bypass Scanner
auxiliary/scanner/misc/dvr_config_disclosureMultiple DVR Manufacturers Configuration Disclosure
auxiliary/scanner/misc/easycafe_server_fileaccessEasyCafe Server Remote File Access
auxiliary/scanner/misc/freeswitch_event_socket_loginFreeSWITCH Event Socket Login
auxiliary/scanner/misc/ibm_mq_channel_bruteIBM WebSphere MQ Channel Name Bruteforce
auxiliary/scanner/misc/ibm_mq_enumIdentify Queue Manager Name and MQ Version
auxiliary/scanner/misc/ibm_mq_loginIBM WebSphere MQ Login Check
auxiliary/scanner/misc/ib_service_mgr_infoBorland InterBase Services Manager Information
auxiliary/scanner/misc/java_jmx_serverJava JMX Server Insecure Endpoint Code Execution Scanner
auxiliary/scanner/misc/java_rmi_serverJava RMI Server Insecure Endpoint Code Execution Scanner
auxiliary/scanner/misc/oki_scannerOKI Printer Default Login Credential Scanner
auxiliary/scanner/misc/poisonivy_control_scannerPoison Ivy Command and Control Scanner
auxiliary/scanner/misc/raysharp_dvr_passwordsRay Sharp DVR Password Retriever
auxiliary/scanner/misc/rosewill_rxs3211_passwordsRosewill RXS-3211 IP Camera Password Retriever
auxiliary/scanner/misc/sercomm_backdoor_scannerSerComm Network Device Backdoor Detection
auxiliary/scanner/misc/sunrpc_portmapperSunRPC Portmap Program Enumerator
auxiliary/scanner/misc/zenworks_preboot_fileaccessNovell ZENworks Configuration Management Preboot Service Remote File Access
auxiliary/scanner/mongodb/mongodb_loginMongoDB Login Utility
auxiliary/scanner/motorola/timbuktu_udpMotorola Timbuktu Service Detection
auxiliary/scanner/mqtt/connectMQTT Authentication Scanner
auxiliary/scanner/msf/msf_rpc_loginMetasploit RPC Interface Login Utility
auxiliary/scanner/msf/msf_web_loginMetasploit Web Interface Login Utility
auxiliary/scanner/msmail/exchange_enumExchange email enumeration
auxiliary/scanner/msmail/host_idVulnerable domain identification
auxiliary/scanner/msmail/onprem_enumOn premise user enumeration
auxiliary/scanner/mssql/mssql_hashdumpMSSQL Password Hashdump
auxiliary/scanner/mssql/mssql_loginMSSQL Login Utility
auxiliary/scanner/mssql/mssql_pingMSSQL Ping Utility
auxiliary/scanner/mssql/mssql_schemadumpMSSQL Schema Dump
auxiliary/scanner/mysql/mysql_authbypass_hashdumpMySQL Authentication Bypass Password Dump
auxiliary/scanner/mysql/mysql_file_enumMYSQL File/Directory Enumerator
auxiliary/scanner/mysql/mysql_hashdumpMYSQL Password Hashdump
auxiliary/scanner/mysql/mysql_loginMySQL Login Utility
auxiliary/scanner/mysql/mysql_schemadumpMYSQL Schema Dump
auxiliary/scanner/mysql/mysql_versionMySQL Server Version Enumeration
auxiliary/scanner/mysql/mysql_writable_dirsMYSQL Directory Write Test
auxiliary/scanner/natpmp/natpmp_portscanNAT-PMP External Port Scanner
auxiliary/scanner/nessus/nessus_ntp_loginNessus NTP Login Utility
auxiliary/scanner/nessus/nessus_rest_loginNessus RPC Interface Login Utility
auxiliary/scanner/nessus/nessus_xmlrpc_loginNessus XMLRPC Interface Login Utility
auxiliary/scanner/nessus/nessus_xmlrpc_pingNessus XMLRPC Interface Ping Utility
auxiliary/scanner/netbios/nbnameNetBIOS Information Discovery
auxiliary/scanner/nexpose/nexpose_api_loginNeXpose API Interface Login Utility
auxiliary/scanner/nfs/nfsmountNFS Mount Scanner
auxiliary/scanner/nntp/nntp_loginNNTP Login Utility
auxiliary/scanner/ntp/ntp_monlistNTP Monitor List Scanner
auxiliary/scanner/ntp/ntp_nak_to_the_futureNTP "NAK to the Future"
auxiliary/scanner/ntp/ntp_peer_list_dosNTP Mode 7 PEER_LIST DoS Scanner
auxiliary/scanner/ntp/ntp_peer_list_sum_dosNTP Mode 7 PEER_LIST_SUM DoS Scanner
auxiliary/scanner/ntp/ntp_readvarNTP Clock Variables Disclosure
auxiliary/scanner/ntp/ntp_req_nonce_dosNTP Mode 6 REQ_NONCE DRDoS Scanner
auxiliary/scanner/ntp/ntp_reslist_dosNTP Mode 7 GET_RESTRICT DRDoS Scanner
auxiliary/scanner/ntp/ntp_unsettrap_dosNTP Mode 6 UNSETTRAP DRDoS Scanner
auxiliary/scanner/openvas/openvas_gsad_loginOpenVAS gsad Web Interface Login Utility
auxiliary/scanner/openvas/openvas_omp_loginOpenVAS OMP Login Utility
auxiliary/scanner/openvas/openvas_otp_loginOpenVAS OTP Login Utility
auxiliary/scanner/oracle/emc_sidOracle Enterprise Manager Control SID Discovery
auxiliary/scanner/oracle/isqlplus_loginOracle iSQL*Plus Login Utility
auxiliary/scanner/oracle/isqlplus_sidbruteOracle iSQLPlus SID Check
auxiliary/scanner/oracle/oracle_hashdumpOracle Password Hashdump
auxiliary/scanner/oracle/oracle_loginOracle RDBMS Login Utility
auxiliary/scanner/oracle/sid_bruteOracle TNS Listener SID Bruteforce
auxiliary/scanner/oracle/sid_enumOracle TNS Listener SID Enumeration
auxiliary/scanner/oracle/spy_sidOracle Application Server Spy Servlet SID Enumeration
auxiliary/scanner/oracle/tnslsnr_versionOracle TNS Listener Service Version Query
auxiliary/scanner/oracle/tnspoison_checkerOracle TNS Listener Checker
auxiliary/scanner/oracle/xdb_sid_bruteOracle XML DB SID Discovery via Brute Force
auxiliary/scanner/oracle/xdb_sidOracle XML DB SID Discovery
auxiliary/scanner/pcanywhere/pcanywhere_loginPcAnywhere Login Scanner
auxiliary/scanner/pcanywhere/pcanywhere_tcpPcAnywhere TCP Service Discovery
auxiliary/scanner/pcanywhere/pcanywhere_udpPcAnywhere UDP Service Discovery
auxiliary/scanner/pop3/pop3_loginPOP3 Login Utility
auxiliary/scanner/pop3/pop3_versionPOP3 Banner Grabber
auxiliary/scanner/portmap/portmap_ampPortmapper Amplification Scanner
auxiliary/scanner/portscan/ackTCP ACK Firewall Scanner
auxiliary/scanner/portscan/ftpbounceFTP Bounce Port Scanner
auxiliary/scanner/portscan/synTCP SYN Port Scanner
auxiliary/scanner/portscan/tcpTCP Port Scanner
auxiliary/scanner/portscan/xmasTCP "XMas" Port Scanner
auxiliary/scanner/postgres/postgres_dbname_flag_injectionPostgreSQL Database Name Command Line Flag Injection
auxiliary/scanner/postgres/postgres_hashdumpPostgres Password Hashdump
auxiliary/scanner/postgres/postgres_loginPostgreSQL Login Utility
auxiliary/scanner/postgres/postgres_schemadumpPostgres Schema Dump
auxiliary/scanner/postgres/postgres_versionPostgreSQL Version Probe
auxiliary/scanner/printer/canon_iradv_pwd_extractCanon IR-Adv Password Extractor
auxiliary/scanner/printer/printer_delete_filePrinter File Deletion Scanner
auxiliary/scanner/printer/printer_download_filePrinter File Download Scanner
auxiliary/scanner/printer/printer_env_varsPrinter Environment Variables Scanner
auxiliary/scanner/printer/printer_list_dirPrinter Directory Listing Scanner
auxiliary/scanner/printer/printer_list_volumesPrinter Volume Listing Scanner
auxiliary/scanner/printer/printer_ready_messagePrinter Ready Message Scanner
auxiliary/scanner/printer/printer_upload_filePrinter File Upload Scanner
auxiliary/scanner/printer/printer_version_infoPrinter Version Information Scanner
auxiliary/scanner/quake/server_infoGather Quake Server Information
auxiliary/scanner/rdp/cve_2019_0708_bluekeepCVE-2019-0708 BlueKeep Microsoft Remote Desktop RCE Check
auxiliary/scanner/rdp/ms12_020_checkMS12-020 Microsoft Remote Desktop Checker
auxiliary/scanner/rdp/rdp_scannerIdentify endpoints speaking the Remote Desktop Protocol (RDP)
auxiliary/scanner/redis/file_uploadRedis File Upload
auxiliary/scanner/redis/redis_loginRedis Login Utility
auxiliary/scanner/redis/redis_serverRedis Command Execute Scanner
auxiliary/scanner/rogue/rogue_recvRogue Gateway Detection: Receiver
auxiliary/scanner/rogue/rogue_sendRogue Gateway Detection: Sender
auxiliary/scanner/rservices/rexec_loginrexec Authentication Scanner
auxiliary/scanner/rservices/rlogin_loginrlogin Authentication Scanner
auxiliary/scanner/rservices/rsh_loginrsh Authentication Scanner
auxiliary/scanner/rsync/modules_listList Rsync Modules
auxiliary/scanner/sage/x3_adxsrv_loginSage X3 AdxAdmin Login Scanner
auxiliary/scanner/sap/sap_ctc_verb_tampering_user_mgmtSAP CTC Service Verb Tampering User Management
auxiliary/scanner/sap/sap_hostctrl_getcomputersystemSAP Host Agent Information Disclosure
auxiliary/scanner/sap/sap_icf_public_infoSAP ICF /sap/public/info Service Sensitive Information Gathering
auxiliary/scanner/sap/sap_icm_urlscanSAP URL Scanner
auxiliary/scanner/sap/sap_mgmt_con_abaplogSAP Management Console ABAP Syslog Disclosure
auxiliary/scanner/sap/sap_mgmt_con_brute_loginSAP Management Console Brute Force
auxiliary/scanner/sap/sap_mgmt_con_extractusersSAP Management Console Extract Users
auxiliary/scanner/sap/sap_mgmt_con_getaccesspointsSAP Management Console Get Access Points
auxiliary/scanner/sap/sap_mgmt_con_getenvSAP Management Console getEnvironment
auxiliary/scanner/sap/sap_mgmt_con_getlogfilesSAP Management Console Get Logfile
auxiliary/scanner/sap/sap_mgmt_con_getprocesslistSAP Management Console GetProcessList
auxiliary/scanner/sap/sap_mgmt_con_getprocessparameterSAP Management Console Get Process Parameters
auxiliary/scanner/sap/sap_mgmt_con_instancepropertiesSAP Management Console Instance Properties
auxiliary/scanner/sap/sap_mgmt_con_listconfigfilesSAP Management Console List Config Files
auxiliary/scanner/sap/sap_mgmt_con_listlogfilesSAP Management Console List Logfiles
auxiliary/scanner/sap/sap_mgmt_con_startprofileSAP Management Console getStartProfile
auxiliary/scanner/sap/sap_mgmt_con_versionSAP Management Console Version Detection
auxiliary/scanner/sap/sap_router_info_requestSAPRouter Admin Request
auxiliary/scanner/sap/sap_router_portscannerSAPRouter Port Scanner
auxiliary/scanner/sap/sap_service_discoverySAP Service Discovery
auxiliary/scanner/sap/sap_smb_relaySAP SMB Relay Abuse
auxiliary/scanner/sap/sap_soap_bapi_user_create1SAP /sap/bc/soap/rfc SOAP Service BAPI_USER_CREATE1 Function User Creation
auxiliary/scanner/sap/sap_soap_rfc_brute_loginSAP SOAP Service RFC_PING Login Brute Forcer
auxiliary/scanner/sap/sap_soap_rfc_dbmcli_sxpg_call_system_command_execSAP /sap/bc/soap/rfc SOAP Service SXPG_CALL_SYSTEM Function Command Injection
auxiliary/scanner/sap/sap_soap_rfc_dbmcli_sxpg_command_execSAP /sap/bc/soap/rfc SOAP Service SXPG_COMMAND_EXEC Function Command Injection
auxiliary/scanner/sap/sap_soap_rfc_eps_get_directory_listingSAP SOAP RFC EPS_GET_DIRECTORY_LISTING Directories Information Disclosure
auxiliary/scanner/sap/sap_soap_rfc_pfl_check_os_file_existenceSAP SOAP RFC PFL_CHECK_OS_FILE_EXISTENCE File Existence Check
auxiliary/scanner/sap/sap_soap_rfc_pingSAP /sap/bc/soap/rfc SOAP Service RFC_PING Function Service Discovery
auxiliary/scanner/sap/sap_soap_rfc_read_tableSAP /sap/bc/soap/rfc SOAP Service RFC_READ_TABLE Function Dump Data
auxiliary/scanner/sap/sap_soap_rfc_rzl_read_dirSAP SOAP RFC RZL_READ_DIR_LOCAL Directory Contents Listing
auxiliary/scanner/sap/sap_soap_rfc_susr_rfc_user_interfaceSAP /sap/bc/soap/rfc SOAP Service SUSR_RFC_USER_INTERFACE Function User Creation
auxiliary/scanner/sap/sap_soap_rfc_sxpg_call_system_execSAP /sap/bc/soap/rfc SOAP Service SXPG_CALL_SYSTEM Function Command Execution
auxiliary/scanner/sap/sap_soap_rfc_sxpg_command_execSAP SOAP RFC SXPG_COMMAND_EXECUTE
auxiliary/scanner/sap/sap_soap_rfc_system_infoSAP /sap/bc/soap/rfc SOAP Service RFC_SYSTEM_INFO Function Sensitive Information Gathering
auxiliary/scanner/sap/sap_soap_th_saprel_disclosureSAP /sap/bc/soap/rfc SOAP Service TH_SAPREL Function Information Disclosure
auxiliary/scanner/sap/sap_web_gui_brute_loginSAP Web GUI Login Brute Forcer
auxiliary/scanner/scada/bacnet_l3BACnet Scanner
auxiliary/scanner/scada/digi_addp_rebootDigi ADDP Remote Reboot Initiator
auxiliary/scanner/scada/digi_addp_versionDigi ADDP Information Discovery
auxiliary/scanner/scada/digi_realport_serialport_scanDigi RealPort Serial Server Port Scanner
auxiliary/scanner/scada/digi_realport_versionDigi RealPort Serial Server Version
auxiliary/scanner/scada/indusoft_ntwebserver_fileaccessIndusoft WebStudio NTWebServer Remote File Access
auxiliary/scanner/scada/koyo_loginKoyo DirectLogic PLC Password Brute Force Utility
auxiliary/scanner/scada/modbus_banner_grabbingModbus Banner Grabbing
auxiliary/scanner/scada/modbusclientModbus Client Utility
auxiliary/scanner/scada/modbusdetectModbus Version Scanner
auxiliary/scanner/scada/modbus_findunitidModbus Unit ID and Station ID Enumerator
auxiliary/scanner/scada/moxa_discoverMoxa UDP Device Discovery
auxiliary/scanner/scada/pcomclientUnitronics PCOM Client
auxiliary/scanner/scada/profinet_siemensSiemens Profinet Scanner
auxiliary/scanner/scada/sielco_winlog_fileaccessSielco Sistemi Winlog Remote File Access
auxiliary/scanner/sip/enumeratorSIP Username Enumerator (UDP)
auxiliary/scanner/sip/enumerator_tcpSIP Username Enumerator (TCP)
auxiliary/scanner/sip/optionsSIP Endpoint Scanner (UDP)
auxiliary/scanner/sip/options_tcpSIP Endpoint Scanner (TCP)
auxiliary/scanner/sip/sipdroid_ext_enumSIPDroid Extension Grabber
auxiliary/scanner/smb/impacket/dcomexecDCOM Exec
auxiliary/scanner/smb/impacket/secretsdumpDCOM Exec
auxiliary/scanner/smb/impacket/wmiexecWMI Exec
auxiliary/scanner/smb/pipe_auditorSMB Session Pipe Auditor
auxiliary/scanner/smb/pipe_dcerpc_auditorSMB Session Pipe DCERPC Auditor
auxiliary/scanner/smb/psexec_loggedin_usersMicrosoft Windows Authenticated Logged In Users Enumeration
auxiliary/scanner/smb/smb_enum_gppSMB Group Policy Preference Saved Passwords Enumeration
auxiliary/scanner/smb/smb_enumsharesSMB Share Enumeration
auxiliary/scanner/smb/smb_enumusers_domainSMB Domain User Enumeration
auxiliary/scanner/smb/smb_enumusersSMB User Enumeration (SAM EnumUsers)
auxiliary/scanner/smb/smb_loginSMB Login Check Scanner
auxiliary/scanner/smb/smb_lookupsidSMB SID User Enumeration (LookupSid)
auxiliary/scanner/smb/smb_ms17_010MS17-010 SMB RCE Detection
auxiliary/scanner/smb/smb_uninit_credSamba _netr_ServerPasswordSet Uninitialized Credential State
auxiliary/scanner/smb/smb_versionSMB Version Detection
auxiliary/scanner/smtp/smtp_enumSMTP User Enumeration Utility
auxiliary/scanner/smtp/smtp_ntlm_domainSMTP NTLM Domain Extraction
auxiliary/scanner/smtp/smtp_relaySMTP Open Relay Detection
auxiliary/scanner/smtp/smtp_versionSMTP Banner Grabber
auxiliary/scanner/snmp/aix_versionAIX SNMP Scanner Auxiliary Module
auxiliary/scanner/snmp/arris_dg950Arris DG950A Cable Modem Wifi Enumeration
auxiliary/scanner/snmp/brocade_enumhashBrocade Password Hash Enumeration
auxiliary/scanner/snmp/cisco_config_tftpCisco IOS SNMP Configuration Grabber (TFTP)
auxiliary/scanner/snmp/cisco_upload_fileCisco IOS SNMP File Upload (TFTP)
auxiliary/scanner/snmp/cnpilot_r_snmp_lootCambium cnPilot r200/r201 SNMP Enumeration
auxiliary/scanner/snmp/epmp1000_snmp_lootCambium ePMP 1000 SNMP Enumeration
auxiliary/scanner/snmp/netopia_enumNetopia 3347 Cable Modem Wifi Enumeration
auxiliary/scanner/snmp/sbg6580_enumARRIS / Motorola SBG6580 Cable Modem SNMP Enumeration Module
auxiliary/scanner/snmp/snmp_enum_hp_laserjetHP LaserJet Printer SNMP Enumeration
auxiliary/scanner/snmp/snmp_enumSNMP Enumeration Module
auxiliary/scanner/snmp/snmp_enumsharesSNMP Windows SMB Share Enumeration
auxiliary/scanner/snmp/snmp_enumusersSNMP Windows Username Enumeration
auxiliary/scanner/snmp/snmp_loginSNMP Community Login Scanner
auxiliary/scanner/snmp/snmp_setSNMP Set Module
auxiliary/scanner/snmp/ubee_ddw3611Ubee DDW3611b Cable Modem Wifi Enumeration
auxiliary/scanner/snmp/xerox_workcentre_enumusersXerox WorkCentre User Enumeration (SNMP)
auxiliary/scanner/ssh/apache_karaf_command_executionApache Karaf Default Credentials Command Execution
auxiliary/scanner/ssh/cerberus_sftp_enumusersCerberus FTP Server SFTP Username Enumeration
auxiliary/scanner/ssh/detect_kippoKippo SSH Honeypot Detector
auxiliary/scanner/ssh/eaton_xpert_backdoorEaton Xpert Meter SSH Private Key Exposure Scanner
auxiliary/scanner/ssh/fortinet_backdoorFortinet SSH Backdoor Scanner
auxiliary/scanner/ssh/juniper_backdoorJuniper SSH Backdoor Scanner
auxiliary/scanner/ssh/karaf_loginApache Karaf Login Utility
auxiliary/scanner/ssh/libssh_auth_bypasslibssh Authentication Bypass Scanner
auxiliary/scanner/ssh/ssh_enum_git_keysTest SSH Github Access
auxiliary/scanner/ssh/ssh_enumusersSSH Username Enumeration
auxiliary/scanner/ssh/ssh_identify_pubkeysSSH Public Key Acceptance Scanner
auxiliary/scanner/ssh/ssh_loginSSH Login Check Scanner
auxiliary/scanner/ssh/ssh_login_pubkeySSH Public Key Login Scanner
auxiliary/scanner/ssh/ssh_versionSSH Version Scanner
auxiliary/scanner/ssl/bleichenbacher_oracleScanner for Bleichenbacher Oracle in RSA PKCS #1 v1.5
auxiliary/scanner/ssl/openssl_ccsOpenSSL Server-Side ChangeCipherSpec Injection Scanner
auxiliary/scanner/ssl/openssl_heartbleedOpenSSL Heartbeat (Heartbleed) Information Leak
auxiliary/scanner/ssl/ssl_versionSSL/TLS Version Detection
auxiliary/scanner/steam/server_infoGather Steam Server Information
auxiliary/scanner/telephony/wardialWardialer
auxiliary/scanner/telnet/brocade_enable_loginBrocade Enable Login Check Scanner
auxiliary/scanner/telnet/lantronix_telnet_passwordLantronix Telnet Password Recovery
auxiliary/scanner/telnet/lantronix_telnet_versionLantronix Telnet Service Banner Detection
auxiliary/scanner/telnet/satel_cmd_execSatel Iberia SenNet Data Logger and Electricity Meters Command Injection Vulnerability
auxiliary/scanner/telnet/telnet_encrypt_overflowTelnet Service Encryption Key ID Overflow Detection
auxiliary/scanner/telnet/telnet_loginTelnet Login Check Scanner
auxiliary/scanner/telnet/telnet_ruggedcomRuggedCom Telnet Password Generator
auxiliary/scanner/telnet/telnet_versionTelnet Service Banner Detection
auxiliary/scanner/teradata/teradata_odbc_loginTeradata ODBC Login Scanner Module
auxiliary/scanner/tftp/ipswitch_whatsupgold_tftpIpSwitch WhatsUp Gold TFTP Directory Traversal
auxiliary/scanner/tftp/netdecision_tftpNetDecision 4.2 TFTP Directory Traversal
auxiliary/scanner/tftp/tftpbruteTFTP Brute Forcer
auxiliary/scanner/ubiquiti/ubiquiti_discoverUbiquiti Discovery Scanner
auxiliary/scanner/udp/udp_amplificationUDP Amplification Scanner
auxiliary/scanner/upnp/ssdp_ampSSDP ssdp:all M-SEARCH Amplification Scanner
auxiliary/scanner/upnp/ssdp_msearchUPnP SSDP M-SEARCH Information Discovery
auxiliary/scanner/varnish/varnish_cli_file_readVarnish Cache CLI File Read
auxiliary/scanner/varnish/varnish_cli_loginVarnish Cache CLI Login Utility
auxiliary/scanner/vmware/esx_fingerprintVMWare ESX/ESXi Fingerprint Scanner
auxiliary/scanner/vmware/vmauthd_loginVMWare Authentication Daemon Login Scanner
auxiliary/scanner/vmware/vmauthd_versionVMWare Authentication Daemon Version Scanner
auxiliary/scanner/vmware/vmware_enum_permissionsVMWare Enumerate Permissions
auxiliary/scanner/vmware/vmware_enum_sessionsVMWare Enumerate Active Sessions
auxiliary/scanner/vmware/vmware_enum_usersVMWare Enumerate User Accounts
auxiliary/scanner/vmware/vmware_enum_vmsVMWare Enumerate Virtual Machines
auxiliary/scanner/vmware/vmware_host_detailsVMWare Enumerate Host Details
auxiliary/scanner/vmware/vmware_http_loginVMWare Web Login Scanner
auxiliary/scanner/vmware/vmware_screenshot_stealerVMWare Screenshot Stealer
auxiliary/scanner/vmware/vmware_server_dir_travVMware Server Directory Traversal Vulnerability
auxiliary/scanner/vmware/vmware_update_manager_traversalVMWare Update Manager 4 Directory Traversal
auxiliary/scanner/vnc/ard_root_pwApple Remote Desktop Root Vulnerability
auxiliary/scanner/vnc/vnc_loginVNC Authentication Scanner
auxiliary/scanner/vnc/vnc_none_authVNC Authentication None Detection
auxiliary/scanner/voice/recorderTelephone Line Voice Scanner
auxiliary/scanner/vxworks/urgent11_checkURGENT/11 Scanner, Based on Detection Tool by Armis
auxiliary/scanner/vxworks/wdbrpc_bootlineVxWorks WDB Agent Boot Parameter Scanner
auxiliary/scanner/vxworks/wdbrpc_versionVxWorks WDB Agent Version Scanner
auxiliary/scanner/winrm/winrm_auth_methodsWinRM Authentication Method Detection
auxiliary/scanner/winrm/winrm_cmdWinRM Command Runner
auxiliary/scanner/winrm/winrm_loginWinRM Login Utility
auxiliary/scanner/winrm/winrm_wqlWinRM WQL Query Runner
auxiliary/scanner/wproxy/att_open_proxyOpen WAN-to-LAN proxy on AT&T routers
auxiliary/scanner/wsdd/wsdd_queryWS-Discovery Information Discovery
auxiliary/scanner/x11/open_x11X11 No-Auth Scanner
auxiliary/server/android_browsable_msf_launchAndroid Meterpreter Browsable Launcher
auxiliary/server/android_mercury_parseuriAndroid Mercury Browser Intent URI Scheme and Directory Traversal Vulnerability
auxiliary/server/browser_autopwn2HTTP Client Automatic Exploiter 2 (Browser Autopwn)
auxiliary/server/browser_autopwnHTTP Client Automatic Exploiter
auxiliary/server/capture/drdaAuthentication Capture: DRDA (DB2, Informix, Derby)
auxiliary/server/capture/ftpAuthentication Capture: FTP
auxiliary/server/capture/http_basicHTTP Client Basic Authentication Credential Collector
auxiliary/server/capture/httpAuthentication Capture: HTTP
auxiliary/server/capture/http_javascript_keyloggerCapture: HTTP JavaScript Keylogger
auxiliary/server/capture/http_ntlmHTTP Client MS Credential Catcher
auxiliary/server/capture/imapAuthentication Capture: IMAP
auxiliary/server/capture/mssqlAuthentication Capture: MSSQL
auxiliary/server/capture/mysqlAuthentication Capture: MySQL
auxiliary/server/capture/pop3Authentication Capture: POP3
auxiliary/server/capture/postgresqlAuthentication Capture: PostgreSQL
auxiliary/server/capture/printjob_capturePrintjob Capture Service
auxiliary/server/capture/sipAuthentication Capture: SIP
auxiliary/server/capture/smbAuthentication Capture: SMB
auxiliary/server/capture/smtpAuthentication Capture: SMTP
auxiliary/server/capture/telnetAuthentication Capture: Telnet
auxiliary/server/capture/vncAuthentication Capture: VNC
auxiliary/server/dhclient_bash_envDHCP Client Bash Environment Variable Code Injection (Shellshock)
auxiliary/server/dhcpDHCP Server
auxiliary/server/dns/native_serverNative DNS Server (Example)
auxiliary/server/dns/spoofhelperDNS Spoofing Helper Service
auxiliary/server/fakednsFake DNS Service
auxiliary/server/ftpFTP File Server
auxiliary/server/http_ntlmrelayHTTP Client MS Credential Relayer
auxiliary/server/icmp_exfilICMP Exfiltration Service
auxiliary/server/jsse_skiptls_mitm_proxyJava Secure Socket Extension (JSSE) SKIP-TLS MITM Proxy
auxiliary/server/ldapNative LDAP Server (Example)
auxiliary/server/local_hwbridgeHardware Bridge Server
auxiliary/server/ms15_134_mcl_leakMS15-134 Microsoft Windows Media Center MCL Information Disclosure
auxiliary/server/netbios_spoof_natNetBIOS Response "BadTunnel" Brute Force Spoof (NAT Tunnel)
auxiliary/server/openssl_altchainsforgery_mitm_proxyOpenSSL Alternative Chains Certificate Forgery MITM Proxy
auxiliary/server/openssl_heartbeat_client_memoryOpenSSL Heartbeat (Heartbleed) Client Memory Exposure
auxiliary/server/pxeexploitPXE Boot Exploit Server
auxiliary/server/regsvr32_command_delivery_serverRegsvr32.exe (.sct) Command Delivery Server
auxiliary/server/socks_proxySOCKS Proxy Server
auxiliary/server/socks_uncSOCKS Proxy UNC Path Redirection
auxiliary/server/teamviewer_uri_smb_redirectTeamViewer Unquoted URI Handler SMB Redirect
auxiliary/server/tftpTFTP File Server
auxiliary/server/webkit_xslt_dropperCross Platform Webkit File Dropper
auxiliary/server/wget_symlink_file_writeGNU Wget FTP Symlink Arbitrary Filesystem Access
auxiliary/server/wpadWPAD.dat File Server
auxiliary/sniffer/psnufflepSnuffle Packet Sniffer
auxiliary/spoof/arp/arp_poisoningARP Spoof
auxiliary/spoof/cisco/cdpSend Cisco Discovery Protocol (CDP) Packets
auxiliary/spoof/cisco/dtpForge Cisco DTP Packets
auxiliary/spoof/dns/bailiwicked_domainDNS BailiWicked Domain Attack
auxiliary/spoof/dns/bailiwicked_hostDNS BailiWicked Host Attack
auxiliary/spoof/dns/compare_resultsDNS Lookup Result Comparison
auxiliary/spoof/dns/native_spooferNative DNS Spoofer (Example)
auxiliary/spoof/llmnr/llmnr_responseLLMNR Spoofer
auxiliary/spoof/mdns/mdns_responsemDNS Spoofer
auxiliary/spoof/nbns/nbns_responseNetBIOS Name Service Spoofer
auxiliary/spoof/replay/pcap_replayPcap Replay Utility
auxiliary/sqli/dlink/dlink_central_wifimanager_sqliD-Link Central WiFiManager SQL injection
auxiliary/sqli/openemr/openemr_sqli_dumpOpenEMR 5.0.1 Patch 6 SQLi Dump
auxiliary/sqli/oracle/dbms_cdc_ipublishOracle DB SQL Injection via SYS.DBMS_CDC_IPUBLISH.ALTER_HOTLOG_INTERNAL_CSOURCE
auxiliary/sqli/oracle/dbms_cdc_publish2Oracle DB SQL Injection via SYS.DBMS_CDC_PUBLISH.DROP_CHANGE_SOURCE
auxiliary/sqli/oracle/dbms_cdc_publish3Oracle DB SQL Injection via SYS.DBMS_CDC_PUBLISH.CREATE_CHANGE_SET
auxiliary/sqli/oracle/dbms_cdc_publishOracle DB SQL Injection via SYS.DBMS_CDC_PUBLISH.ALTER_AUTOLOG_CHANGE_SOURCE
auxiliary/sqli/oracle/dbms_cdc_subscribe_activate_subscriptionOracle DB SQL Injection via SYS.DBMS_CDC_SUBSCRIBE.ACTIVATE_SUBSCRIPTION
auxiliary/sqli/oracle/dbms_export_extensionOracle DB SQL Injection via DBMS_EXPORT_EXTENSION
auxiliary/sqli/oracle/dbms_metadata_get_granted_xmlOracle DB SQL Injection via SYS.DBMS_METADATA.GET_GRANTED_XML
auxiliary/sqli/oracle/dbms_metadata_get_xmlOracle DB SQL Injection via SYS.DBMS_METADATA.GET_XML
auxiliary/sqli/oracle/dbms_metadata_openOracle DB SQL Injection via SYS.DBMS_METADATA.OPEN
auxiliary/sqli/oracle/droptable_triggerOracle DB SQL Injection in MDSYS.SDO_TOPO_DROP_FTBL Trigger
auxiliary/sqli/oracle/jvm_os_code_10gOracle DB 10gR2, 11gR1/R2 DBMS_JVM_EXP_PERMS OS Command Execution
auxiliary/sqli/oracle/jvm_os_code_11gOracle DB 11g R1/R2 DBMS_JVM_EXP_PERMS OS Code Execution
auxiliary/sqli/oracle/lt_compressworkspaceOracle DB SQL Injection via SYS.LT.COMPRESSWORKSPACE
auxiliary/sqli/oracle/lt_findricset_cursorOracle DB SQL Injection via SYS.LT.FINDRICSET Evil Cursor Method
auxiliary/sqli/oracle/lt_mergeworkspaceOracle DB SQL Injection via SYS.LT.MERGEWORKSPACE
auxiliary/sqli/oracle/lt_removeworkspaceOracle DB SQL Injection via SYS.LT.REMOVEWORKSPACE
auxiliary/sqli/oracle/lt_rollbackworkspaceOracle DB SQL Injection via SYS.LT.ROLLBACKWORKSPACE
auxiliary/voip/asterisk_loginAsterisk Manager Login Utility
auxiliary/voip/cisco_cucdm_call_forwardViproy CUCDM IP Phone XML Services - Call Forwarding Tool
auxiliary/voip/cisco_cucdm_speed_dialsViproy CUCDM IP Phone XML Services - Speed Dial Attack Tool
auxiliary/voip/sip_deregisterSIP Deregister Extension
auxiliary/voip/sip_invite_spoofSIP Invite Spoof
auxiliary/voip/telisca_ips_lock_controlTelisca IPS Lock Cisco IP Phone Control
auxiliary/vsploit/malware/dns/dns_mariposaVSploit Mariposa DNS Query Module
auxiliary/vsploit/malware/dns/dns_queryVSploit DNS Beaconing Emulation
auxiliary/vsploit/malware/dns/dns_zeusVSploit Zeus DNS Query Module
auxiliary/vsploit/pii/email_piiVSploit Email PII
auxiliary/vsploit/pii/web_piiVSploit Web PII
encoder/cmd/braceBash Brace Expansion Command Encoder
encoder/cmd/echoEcho Command Encoder
encoder/cmd/generic_shGeneric Shell Variable Substitution Command Encoder
encoder/cmd/ifsBourne ${IFS} Substitution Command Encoder
encoder/cmd/perlPerl Command Encoder
encoder/cmd/powershell_base64Powershell Base64 Command Encoder
encoder/cmd/printf_php_mqprintf(1) via PHP magic_quotes Utility Command Encoder
encoder/generic/eicarThe EICAR Encoder
encoder/generic/noneThe "none" Encoder
encoder/mipsbe/byte_xoriByte XORi Encoder
encoder/mipsbe/longxorXOR Encoder
encoder/mipsle/byte_xoriByte XORi Encoder
encoder/mipsle/longxorXOR Encoder
encoder/php/base64PHP Base64 Encoder
encoder/ppc/longxorPPC LongXOR Encoder
encoder/ppc/longxor_tagPPC LongXOR Encoder
encoder/ruby/base64Ruby Base64 Encoder
encoder/sparc/longxor_tagSPARC DWORD XOR Encoder
encoder/x64/xor_contextHostname-based Context Keyed Payload Encoder
encoder/x64/xor_dynamicDynamic key XOR Encoder
encoder/x64/xorXOR Encoder
encoder/x64/zutto_dekiruZutto Dekiru
encoder/x86/add_subAdd/Sub Encoder
encoder/x86/alpha_mixedAlpha2 Alphanumeric Mixedcase Encoder
encoder/x86/alpha_upperAlpha2 Alphanumeric Uppercase Encoder
encoder/x86/avoid_underscore_tolowerAvoid underscore/tolower
encoder/x86/avoid_utf8_tolowerAvoid UTF8/tolower
encoder/x86/bloxorBloXor - A Metamorphic Block Based XOR Encoder
encoder/x86/bmp_polyglotBMP Polyglot
encoder/x86/call4_dword_xorCall+4 Dword XOR Encoder
encoder/x86/context_cpuidCPUID-based Context Keyed Payload Encoder
encoder/x86/context_statstat(2)-based Context Keyed Payload Encoder
encoder/x86/context_timetime(2)-based Context Keyed Payload Encoder
encoder/x86/countdownSingle-byte XOR Countdown Encoder
encoder/x86/fnstenv_movVariable-length Fnstenv/mov Dword XOR Encoder
encoder/x86/jmp_call_additiveJump/Call XOR Additive Feedback Encoder
encoder/x86/nonalphaNon-Alpha Encoder
encoder/x86/nonupperNon-Upper Encoder
encoder/x86/opt_subSub Encoder (optimised)
encoder/x86/serviceRegister Service
encoder/x86/shikata_ga_naiPolymorphic XOR Additive Feedback Encoder
encoder/x86/single_static_bitSingle Static Bit
encoder/x86/unicode_mixedAlpha2 Alphanumeric Unicode Mixedcase Encoder
encoder/x86/unicode_upperAlpha2 Alphanumeric Unicode Uppercase Encoder
encoder/x86/xor_dynamicDynamic key XOR Encoder
evasion/windows/applocker_evasion_install_utilApplocker Evasion - .NET Framework Installation Utility
evasion/windows/applocker_evasion_msbuildApplocker Evasion - MSBuild
evasion/windows/applocker_evasion_presentationhostApplocker Evasion - Windows Presentation Foundation Host
evasion/windows/applocker_evasion_regasm_regsvcsApplocker Evasion - Microsoft .NET Assembly Registration Utility
evasion/windows/applocker_evasion_workflow_compilerApplocker Evasion - Microsoft Workflow Compiler
evasion/windows/process_herpaderpingProcess Herpaderping evasion technique
evasion/windows/syscall_injectDirect windows syscall evasion technique
evasion/windows/windows_defender_exeMicrosoft Windows Defender Evasive Executable
evasion/windows/windows_defender_js_htaMicrosoft Windows Defender Evasive JS.Net and HTA
exploit/aix/local/ibstat_pathibstat $PATH Privilege Escalation
exploit/aix/local/xorg_x11_serverXorg X11 Server Local Privilege Escalation
exploit/aix/rpc_cmsd_opcode21AIX Calendar Manager Service Daemon (rpc.cmsd) Opcode 21 Buffer Overflow
exploit/aix/rpc_ttdbserverd_realpathToolTalk rpc.ttdbserverd _tt_internal_realpath Buffer Overflow (AIX)
exploit/android/adb/adb_server_execAndroid ADB Debug Server Remote Payload Execution
exploit/android/browser/samsung_knox_smdm_urlSamsung Galaxy KNOX Android Browser RCE
exploit/android/browser/stagefright_mp4_tx3g_64bitAndroid Stagefright MP4 tx3g Integer Overflow
exploit/android/browser/webview_addjavascriptinterfaceAndroid Browser and WebView addJavascriptInterface Code Execution
exploit/android/fileformat/adobe_reader_pdf_js_interfaceAdobe Reader for Android addJavascriptInterface Exploit
exploit/android/local/binder_uafAndroid Binder Use-After-Free Exploit
exploit/android/local/futex_requeueAndroid 'Towelroot' Futex Requeue Kernel Exploit
exploit/android/local/janusAndroid Janus APK Signature bypass
exploit/android/local/put_user_vrootAndroid get_user/put_user Exploit
exploit/android/local/su_execAndroid 'su' Privilege Escalation
exploit/apple_ios/browser/safari_jitSafari Webkit JIT Exploit for iOS 7.1.2
exploit/apple_ios/browser/safari_libtiffApple iOS MobileSafari LibTIFF Buffer Overflow
exploit/apple_ios/browser/webkit_createthisSafari Webkit Proxy Object Type Confusion
exploit/apple_ios/browser/webkit_tridentWebKit not_number defineProperties UAF
exploit/apple_ios/email/mobilemail_libtiffApple iOS MobileMail LibTIFF Buffer Overflow
exploit/apple_ios/ssh/cydia_default_sshApple iOS Default SSH Password Vulnerability
exploit/bsd/finger/morris_fingerd_bofMorris Worm fingerd Stack Buffer Overflow
exploit/bsdi/softcart/mercantec_softcartMercantec SoftCart CGI Overflow
exploit/dialup/multi/login/manyargsSystem V Derived /bin/login Extraneous Arguments Buffer Overflow
exploit/firefox/local/exec_shellcodeFirefox Exec Shellcode from Privileged Javascript Shell
exploit/freebsd/ftp/proftp_telnet_iacProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (FreeBSD)
exploit/freebsd/http/citrix_dir_traversal_rceCitrix ADC (NetScaler) Directory Traversal RCE
exploit/freebsd/http/watchguard_cmd_execWatchguard XCS Remote Command Execution
exploit/freebsd/local/intel_sysret_priv_escFreeBSD Intel SYSRET Privilege Escalation
exploit/freebsd/local/ip6_setpktopt_uaf_priv_escFreeBSD ip6_setpktopt Use-After-Free Privilege Escalation
exploit/freebsd/local/mmapFreeBSD 9 Address Space Manipulation Privilege Escalation
exploit/freebsd/local/rtld_execl_priv_escFreeBSD rtld execl() Privilege Escalation
exploit/freebsd/local/watchguard_fix_corrupt_mailWatchguard XCS FixCorruptMail Local Privilege Escalation
exploit/freebsd/misc/citrix_netscaler_soap_bofCitrix NetScaler SOAP Handler Remote Code Execution
exploit/freebsd/samba/trans2openSamba trans2open Overflow (*BSD x86)
exploit/freebsd/tacacs/xtacacsd_reportXTACACSD report() Buffer Overflow
exploit/freebsd/telnet/telnet_encrypt_keyidFreeBSD Telnet Service Encryption Key ID Buffer Overflow
exploit/freebsd/webapp/spamtitan_unauth_rceSpamTitan Unauthenticated RCE
exploit/hpux/lpd/cleanup_execHP-UX LPD Command Execution
exploit/irix/lpd/tagprinter_execIrix LPD tagprinter Command Execution
exploit/linux/antivirus/escan_password_execeScan Web Management Console Command Injection
exploit/linux/browser/adobe_flashplayer_aslaunchAdobe Flash Player ActionScript Launch Command Execution Vulnerability
exploit/linux/fileformat/unrar_cve_2022_30333UnRAR Path Traversal (CVE-2022-30333)
exploit/linux/ftp/proftp_sreplaceProFTPD 1.2 - 1.3.0 sreplace Buffer Overflow (Linux)
exploit/linux/ftp/proftp_telnet_iacProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (Linux)
exploit/linux/games/ut2004_secureUnreal Tournament 2004 "secure" Overflow (Linux)
exploit/linux/http/accellion_fta_getstatus_oauthAccellion FTA getStatus verify_oauth_token Command Execution
exploit/linux/http/advantech_switch_bash_env_execAdvantech Switch Bash Environment Variable Code Injection (Shellshock)
exploit/linux/http/airties_login_cgi_bofAirties login-cgi Buffer Overflow
exploit/linux/http/alcatel_omnipcx_mastercgi_execAlcatel-Lucent OmniPCX Enterprise masterCGI Arbitrary Command Execution
exploit/linux/http/alienvault_execAlienVault OSSIM/USM Remote Code Execution
exploit/linux/http/alienvault_sqli_execAlienVault OSSIM SQL Injection and Remote Code Execution
exploit/linux/http/apache_continuum_cmd_execApache Continuum Arbitrary Command Execution
exploit/linux/http/apache_couchdb_cmd_execApache CouchDB Arbitrary Command Execution
exploit/linux/http/apache_druid_js_rceApache Druid 0.20.0 Remote Command Execution
exploit/linux/http/apache_ofbiz_deserializationApache OFBiz XML-RPC Java Deserialization
exploit/linux/http/apache_ofbiz_deserialization_soapApache OFBiz SOAP Java Deserialization
exploit/linux/http/apache_spark_rce_cve_2022_33891Apache Spark Unauthenticated Command Injection RCE
exploit/linux/http/artica_proxy_auth_bypass_service_cmds_peform_command_injectionArtica proxy 4.30.000000 Auth Bypass service-cmds-peform Command Injection
exploit/linux/http/astium_sqli_uploadAstium Remote Code Execution
exploit/linux/http/asuswrt_lan_rceAsusWRT LAN Unauthenticated Remote Code Execution
exploit/linux/http/atlassian_confluence_webwork_ognl_injectionAtlassian Confluence WebWork OGNL Injection
exploit/linux/http/atutor_filemanager_traversalATutor 2.2.1 Directory Traversal / Remote Code Execution
exploit/linux/http/axis_app_installAxis IP Camera Application Upload
exploit/linux/http/axis_srv_parhand_rceAxis Network Camera .srv-to-parhand RCE
exploit/linux/http/belkin_login_bofBelkin Play N750 login.cgi Buffer Overflow
exploit/linux/http/bitbucket_git_cmd_injectionBitbucket Git Command Injection
exploit/linux/http/bludit_upload_images_execBludit Directory Traversal Image File Upload Vulnerability
exploit/linux/http/cayin_cms_ntpCayin CMS NTP Server RCE
exploit/linux/http/centreon_pollers_auth_rceCentreon Poller Authenticated Remote Command Execution
exploit/linux/http/centreon_sqli_execCentreon SQL and Command Injection
exploit/linux/http/centreon_useralias_execCentreon Web Useralias Command Execution
exploit/linux/http/cfme_manageiq_evm_upload_execRed Hat CloudForms Management Engine 5.1 agent/linuxpkgs Path Traversal
exploit/linux/http/cisco_asax_sfr_rceCisco ASA-X with FirePOWER Services Authenticated Command Injection
exploit/linux/http/cisco_firepower_useraddCisco Firepower Management Console 6.0 Post Authentication UserAdd Vulnerability
exploit/linux/http/cisco_hyperflex_file_upload_rceCisco HyperFlex HX Data Platform unauthenticated file upload to RCE (CVE-2021-1499)
exploit/linux/http/cisco_hyperflex_hx_data_platform_cmd_execCisco HyperFlex HX Data Platform Command Execution
exploit/linux/http/cisco_prime_inf_rceCisco Prime Infrastructure Unauthenticated Remote Code Execution
exploit/linux/http/cisco_rv32x_rceCisco RV320 and RV325 Unauthenticated Remote Code Execution
exploit/linux/http/cisco_rv_series_authbypass_and_rceCisco Small Business RV Series Authentication Bypass and Command Injection
exploit/linux/http/cisco_ucs_cloupia_script_rceCisco UCS Director Cloupia Script RCE
exploit/linux/http/cisco_ucs_rceCisco UCS Director Unauthenticated Remote Code Execution
exploit/linux/http/cpi_tararchive_uploadCisco Prime Infrastructure Health Monitor TarArchive Directory Traversal Vulnerability
exploit/linux/http/crypttech_cryptolog_login_execCrypttech CryptoLog Remote Code Execution
exploit/linux/http/cve_2019_1663_cisco_rmi_rceCisco RV110W/RV130(W)/RV215W Routers Management Interface Remote Command Execution
exploit/linux/http/dcos_marathonDC/OS Marathon UI Docker Exploit
exploit/linux/http/ddwrt_cgibin_execDD-WRT HTTP Daemon Arbitrary Command Execution
exploit/linux/http/denyall_waf_execDenyAll Web Application Firewall Remote Code Execution
exploit/linux/http/dlink_authentication_cgi_bofD-Link authentication.cgi Buffer Overflow
exploit/linux/http/dlink_command_php_exec_noauthD-Link Devices Unauthenticated Remote Command Execution
exploit/linux/http/dlink_dcs_930l_authenticated_remote_command_executionD-Link DCS-930L Authenticated Remote Command Execution
exploit/linux/http/dlink_dcs931l_uploadD-Link DCS-931L File Upload
exploit/linux/http/dlink_diagnostic_exec_noauthD-Link DIR-645 / DIR-815 diagnostic.php Command Execution
exploit/linux/http/dlink_dir300_exec_telnetD-Link Devices Unauthenticated Remote Command Execution
exploit/linux/http/dlink_dir605l_captcha_bofD-Link DIR-605L Captcha Handling Buffer Overflow
exploit/linux/http/dlink_dir615_up_execD-Link DIR615h OS Command Injection
exploit/linux/http/dlink_dir850l_unauth_execDIR-850L (Un)authenticated OS Command Exec
exploit/linux/http/dlink_dsl2750b_exec_noauthD-Link DSL-2750B OS Command Injection
exploit/linux/http/dlink_dspw110_cookie_noauth_execD-Link Cookie Command Execution
exploit/linux/http/dlink_dspw215_info_cgi_bofD-Link info.cgi POST Request Buffer Overflow
exploit/linux/http/dlink_dwl_2600_command_injectionDLINK DWL-2600 Authenticated Remote Command Injection
exploit/linux/http/dlink_hedwig_cgi_bofD-Link hedwig.cgi Buffer Overflow in Cookie Header
exploit/linux/http/dlink_hnap_bofD-Link HNAP Request Remote Buffer Overflow
exploit/linux/http/dlink_hnap_header_exec_noauthD-Link Devices HNAP SOAPAction-Header Command Execution
exploit/linux/http/dlink_hnap_login_bofDlink DIR Routers Unauthenticated HNAP Login Stack Buffer Overflow
exploit/linux/http/dlink_upnp_exec_noauthD-Link Devices UPnP SOAP Command Execution
exploit/linux/http/dnalims_admin_execdnaLIMS Admin Module Command Execution
exploit/linux/http/docker_daemon_tcpDocker Daemon - Unprotected TCP Socket Exploit
exploit/linux/http/dolibarr_cmd_execDolibarr ERP/CRM Post-Auth OS Command Injection
exploit/linux/http/dreambox_openpli_shellOpenPLI Webif Arbitrary Command Execution
exploit/linux/http/efw_chpasswd_execEndian Firewall Proxy Password Change Command Injection
exploit/linux/http/elfinder_archive_cmd_injectionelFinder Archive Command Injection
exploit/linux/http/empire_skywalkerPowerShellEmpire Arbitrary File Upload (Skywalker)
exploit/linux/http/esva_execE-Mail Security Virtual Appliance learn-msg.cgi Command Injection
exploit/linux/http/eyesofnetwork_autodiscovery_rceEyesOfNetwork 5.1-5.3 AutoDiscovery Target Command Execution
exploit/linux/http/f5_bigip_tmui_rceF5 BIG-IP TMUI Directory Traversal and File Upload RCE
exploit/linux/http/f5_icall_cmdF5 iControl iCall::Script Root Command Execution
exploit/linux/http/f5_icontrol_execF5 iControl Remote Root Command Execution
exploit/linux/http/f5_icontrol_rceF5 BIG-IP iControl RCE via REST Authentication Bypass
exploit/linux/http/f5_icontrol_rest_ssrf_rceF5 iControl REST Unauthenticated SSRF Token Generation RCE
exploit/linux/http/f5_icontrol_rpmspec_rce_cve_2022_41800F5 BIG-IP iControl Authenticated RCE via RPM Creator
exploit/linux/http/f5_icontrol_soap_csrf_rce_cve_2022_41622F5 BIG-IP iControl CSRF File Write SOAP API
exploit/linux/http/flir_ax8_unauth_rce_cve_2022_37061FLIR AX8 unauthenticated RCE
exploit/linux/http/foreman_openstack_satellite_code_execForeman (Red Hat OpenStack/Satellite) bookmarks/create Code Injection
exploit/linux/http/fortinet_authentication_bypass_cve_2022_40684Fortinet FortiOS, FortiProxy, and FortiSwitchManager authentication bypass.
exploit/linux/http/fritzbox_echo_execFritz!Box Webcm Unauthenticated Command Injection
exploit/linux/http/geutebruck_cmdinject_cve_2021_335xxGeutebruck Multiple Remote Command Execution
exploit/linux/http/geutebruck_instantrec_bofGeutebruck instantrec Remote Command Execution
exploit/linux/http/geutebruck_testaction_execGeutebruck testaction.cgi Remote Command Execution
exploit/linux/http/github_enterprise_secretGithub Enterprise Default Session Secret And Deserialization Vulnerability
exploit/linux/http/gitlist_execGitlist Unauthenticated Remote Command Execution
exploit/linux/http/glpi_htmlawed_php_injectionGLPI htmLawed php command injection
exploit/linux/http/goahead_ldpreloadGoAhead Web Server LD_PRELOAD Arbitrary Module Load
exploit/linux/http/goautodial_3_rce_command_injectionGoAutoDial 3.3 Authentication Bypass / Command Injection
exploit/linux/http/gpsd_format_stringBerlios GPSD Format String Vulnerability
exploit/linux/http/grandstream_gxv3175_settimezone_unauth_cmd_execGrandstream GXV3175 'settimezone' Unauthenticated Command Execution
exploit/linux/http/grandstream_gxv31xx_settimezone_unauth_cmd_execGrandstream GXV31XX 'settimezone' Unauthenticated Command Execution
exploit/linux/http/grandstream_ucm62xx_sendemail_rceGrandstream UCM62xx IP PBX sendPasswordEmail RCE
exploit/linux/http/gravcms_execGravCMS Remote Command Execution
exploit/linux/http/groundwork_monarch_cmd_execGroundWork monarch_scan.cgi OS Command Injection
exploit/linux/http/hadoop_unauth_execHadoop YARN ResourceManager Unauthenticated Command Execution
exploit/linux/http/hikvision_cve_2021_36260_blindHikvision IP Camera Unauthenticated Command Injection
exploit/linux/http/hp_system_managementHP System Management Anonymous Access Code Execution
exploit/linux/http/hp_van_sdn_cmd_injectHP VAN SDN Controller Root Command Injection
exploit/linux/http/huawei_hg532n_cmdinjectHuawei HG532n Command Injection
exploit/linux/http/ibm_drm_rceIBM Data Risk Manager Unauthenticated Remote Code Execution
exploit/linux/http/ibm_qradar_unauth_rceIBM QRadar SIEM Unauthenticated Remote Code Execution
exploit/linux/http/imperva_securesphere_execImperva SecureSphere PWS Command Injection
exploit/linux/http/ipfire_bashbug_execIPFire Bash Environment Variable Injection (Shellshock)
exploit/linux/http/ipfire_oinkcode_execIPFire proxy.cgi RCE
exploit/linux/http/ipfire_pakfire_execIPFire 2.25 Core Update 156 and Prior pakfire.cgi Authenticated RCE
exploit/linux/http/ipfire_proxy_execIPFire proxy.cgi RCE
exploit/linux/http/jenkins_cli_deserializationJenkins CLI Deserialization
exploit/linux/http/kaltura_unserialize_cookie_rceKaltura Remote PHP Code Execution over Cookie
exploit/linux/http/kaltura_unserialize_rceKaltura Remote PHP Code Execution
exploit/linux/http/klog_server_authenticate_user_unauth_command_injectionKlog Server authenticate.php user Unauthenticated Command Injection
exploit/linux/http/kloxo_sqliKloxo SQL Injection and Remote Code Execution
exploit/linux/http/librenms_addhost_cmd_injectLibreNMS addhost Command Injection
exploit/linux/http/librenms_collectd_cmd_injectLibreNMS Collectd Command Injection
exploit/linux/http/lifesize_uvc_ping_rceLifeSize UVC Authenticated RCE via Ping
exploit/linux/http/linksys_apply_cgiLinksys WRT54 Access Point apply.cgi Buffer Overflow
exploit/linux/http/linksys_e1500_apply_execLinksys E1500/E2500 apply.cgi Remote Command Injection
exploit/linux/http/linksys_themoon_execLinksys E-Series TheMoon Remote Command Injection
exploit/linux/http/linksys_wrt110_cmd_execLinksys Devices pingstr Remote Command Injection
exploit/linux/http/linksys_wrt160nv2_apply_execLinksys WRT160nv2 apply.cgi Remote Command Injection
exploit/linux/http/linksys_wrt54gl_apply_execLinksys WRT54GL apply.cgi Command Execution
exploit/linux/http/linksys_wvbr0_user_agent_exec_noauthLinksys WVBR0-25 User-Agent Command Execution
exploit/linux/http/linuxki_rceLinuxKI Toolset 6.01 Remote Command Execution
exploit/linux/http/logsign_execLogsign Remote Command Injection
exploit/linux/http/lucee_admin_imgprocess_file_writeLucee Administrator imgProcess.cfm Arbitrary File Write
exploit/linux/http/mailcleaner_execMailcleaner Remote Code Execution
exploit/linux/http/microfocus_obr_cmd_injectionMicro Focus Operations Bridge Reporter Unauthenticated Command Injection
exploit/linux/http/microfocus_secure_messaging_gatewayMicroFocus Secure Messaging Gateway Remote Code Execution
exploit/linux/http/mida_solutions_eframework_ajaxreq_rceMida Solutions eFramework ajaxreq.php Command Injection
exploit/linux/http/mobileiron_core_log4shellMobileIron Core Unauthenticated JNDI Injection RCE (via Log4Shell)
exploit/linux/http/mobileiron_mdm_hessian_rceMobileIron MDM Hessian-Based Java Deserialization RCE
exploit/linux/http/multi_ncc_ping_execD-Link/TRENDnet NCC Service Command Injection
exploit/linux/http/mutiny_frontend_uploadMutiny 5 Arbitrary File Upload
exploit/linux/http/mvpower_dvr_shell_execMVPower DVR Shell Unauthenticated Command Execution
exploit/linux/http/nagios_xi_autodiscovery_webshellNagios XI Autodiscovery Webshell Upload
exploit/linux/http/nagios_xi_chained_rce_2_electric_boogalooNagios XI Chained Remote Code Execution
exploit/linux/http/nagios_xi_chained_rceNagios XI Chained Remote Code Execution
exploit/linux/http/nagios_xi_magpie_debugNagios XI Magpie_debug.php Root Remote Code Execution
exploit/linux/http/nagios_xi_mibs_authenticated_rceNagios XI 5.6.0-5.7.3 - Mibs.php Authenticated Remote Code Exection
exploit/linux/http/nagios_xi_plugins_check_plugin_authenticated_rceNagios XI Prior to 5.6.6 getprofile.sh Authenticated Remote Command Execution
exploit/linux/http/nagios_xi_plugins_filename_authenticated_rceNagios XI Prior to 5.8.0 - Plugins Filename Authenticated Remote Code Exection
exploit/linux/http/nagios_xi_snmptrap_authenticated_rceNagios XI 5.5.0-5.7.3 - Snmptrap Authenticated Remote Code Exection
exploit/linux/http/netgear_dgn1000b_setup_execNetgear DGN1000B setup.cgi Remote Command Execution
exploit/linux/http/netgear_dgn1000_setup_unauth_execNetgear DGN1000 Setup.cgi Unauthenticated RCE
exploit/linux/http/netgear_dgn2200b_pppoe_execNetgear DGN2200B pppoe.cgi Remote Command Execution
exploit/linux/http/netgear_dnslookup_cmd_execNetgear DGN2200 dnslookup.cgi Command Injection
exploit/linux/http/netgear_r7000_cgibin_execNetgear R7000 and R6400 cgi-bin Command Injection
exploit/linux/http/netgear_readynas_execNETGEAR ReadyNAS Perl Code Evaluation
exploit/linux/http/netgear_unauth_execNetgear Devices Unauthenticated Remote Command Execution
exploit/linux/http/netgear_wnr2000_rceNETGEAR WNR2000v5 (Un)authenticated hidden_lang_avi Stack Buffer Overflow
exploit/linux/http/netsweeper_webadmin_unixloginNetsweeper WebAdmin unixlogin.php Python Code Injection
exploit/linux/http/nexus_repo_manager_el_injectionNexus Repository Manager Java EL Injection RCE
exploit/linux/http/nginx_chunked_sizeNginx HTTP Server 1.3.9-1.4.0 Chunked Encoding Stack Buffer Overflow
exploit/linux/http/nuuo_nvrmini_auth_rceNUUO NVRmini 2 / Crystal / NETGEAR ReadyNAS Surveillance Authenticated Remote Code Execution
exploit/linux/http/nuuo_nvrmini_unauth_rceNUUO NVRmini 2 / NETGEAR ReadyNAS Surveillance Unauthenticated Remote Code Execution
exploit/linux/http/op5_config_execop5 v7.1.9 Configuration Command Execution
exploit/linux/http/openfiler_networkcard_execOpenfiler v2.x NetworkCard Command Execution
exploit/linux/http/pandora_fms_events_execPandora FMS Events Remote Command Execution
exploit/linux/http/pandora_fms_execPandora FMS Remote Code Execution
exploit/linux/http/pandora_fms_sqliPandora FMS Default Credential / SQLi Remote Code Execution
exploit/linux/http/pandora_ping_cmd_execPandora FMS Ping Authenticated Remote Code Execution
exploit/linux/http/panos_op_cmd_execPalo Alto Networks Authenticated Remote Code Execution
exploit/linux/http/panos_readsessionvarsPalo Alto Networks readSessionVarsFromFile() Session Corruption
exploit/linux/http/peercast_urlPeerCast URL Handling Buffer Overflow
exploit/linux/http/php_imap_open_rcephp imap_open Remote Code Execution
exploit/linux/http/pineapp_ldapsyncnow_execPineApp Mail-SeCure ldapsyncnow.php Arbitrary Command Execution
exploit/linux/http/pineapple_bypass_cmdinjectHak5 WiFi Pineapple Preconfiguration Command Injection
exploit/linux/http/pineapple_preconfig_cmdinjectHak5 WiFi Pineapple Preconfiguration Command Injection
exploit/linux/http/pineapp_livelog_execPineApp Mail-SeCure livelog.html Arbitrary Command Execution
exploit/linux/http/pineapp_test_li_conn_execPineApp Mail-SeCure test_li_connection.php Arbitrary Command Execution
exploit/linux/http/piranha_passwd_execRedHat Piranha Virtual Server Package passwd.php3 Arbitrary Command Execution
exploit/linux/http/pulse_secure_cmd_execPulse Secure VPN Arbitrary Command Execution
exploit/linux/http/pulse_secure_gzip_rcePulse Secure VPN gzip RCE
exploit/linux/http/qnap_qcenter_change_passwd_execQNAP Q'Center change_passwd Command Execution
exploit/linux/http/raidsonic_nas_ib5220_exec_noauthRaidsonic NAS Devices Unauthenticated Remote Command Execution
exploit/linux/http/railo_cfml_rfiRailo Remote File Include
exploit/linux/http/rancher_serverRancher Server - Docker Exploit
exploit/linux/http/rconfig_ajaxarchivefiles_rceRconfig 3.x Chained Remote Code Execution
exploit/linux/http/rconfig_vendors_auth_file_upload_rcerConfig Vendors Auth File Upload RCE
exploit/linux/http/realtek_miniigd_upnp_exec_noauthRealtek SDK Miniigd UPnP SOAP Command Execution
exploit/linux/http/riverbed_netprofiler_netexpress_execRiverbed SteelCentral NetProfiler/NetExpress Remote Code Execution
exploit/linux/http/roxy_wi_execRoxy-WI Prior to 6.1.1.0 Unauthenticated Command Injection RCE
exploit/linux/http/saltstack_salt_api_cmd_execSaltStack Salt REST API Arbitrary Command Execution
exploit/linux/http/saltstack_salt_wheel_async_rceSaltStack Salt API Unauthenticated RCE through wheel_async client
exploit/linux/http/samsung_srv_1670d_upload_execSamsung SRN-1670D Web Viewer Version 1.0.0.193 Arbitrary File Read and Upload
exploit/linux/http/seagate_nas_php_exec_noauthSeagate Business NAS Unauthenticated Remote Command Execution
exploit/linux/http/smt_ipmi_close_window_bofSupermicro Onboard IPMI close_window.cgi Buffer Overflow
exploit/linux/http/sonicwall_cve_2021_20039SonicWall SMA 100 Series Authenticated Command Injection
exploit/linux/http/sophos_utm_webadmin_sid_cmd_injectionSophos UTM WebAdmin SID Command Injection
exploit/linux/http/sophos_wpa_iface_execSophos Web Protection Appliance Interface Authenticated Arbitrary Command Execution
exploit/linux/http/sophos_wpa_sblistpack_execSophos Web Protection Appliance sblistpack Arbitrary Command Execution
exploit/linux/http/sourcegraph_gitserver_sshcmdSourcegraph gitserver sshCommand RCE
exploit/linux/http/spark_unauth_rceApache Spark Unauthenticated Command Execution
exploit/linux/http/spring_cloud_gateway_rceSpring Cloud Gateway Remote Code Execution
exploit/linux/http/suitecrm_log_file_rceSuiteCRM Log File Remote Code Execution
exploit/linux/http/supervisor_xmlrpc_execSupervisor XML-RPC Authenticated Remote Code Execution
exploit/linux/http/symantec_messaging_gateway_execSymantec Messaging Gateway Remote Code Execution
exploit/linux/http/symantec_web_gateway_execSymantec Web Gateway 5.0.2.8 ipchange.php Command Injection
exploit/linux/http/symantec_web_gateway_file_uploadSymantec Web Gateway 5.0.2.8 Arbitrary PHP File Upload Vulnerability
exploit/linux/http/symantec_web_gateway_lfiSymantec Web Gateway 5.0.2.8 relfile File Inclusion Vulnerability
exploit/linux/http/symantec_web_gateway_pbcontrolSymantec Web Gateway 5.0.2.18 pbcontrol.php Command Injection
exploit/linux/http/symantec_web_gateway_restoreSymantec Web Gateway 5 restore.php Post Authentication Command Injection
exploit/linux/http/synology_dsm_sliceupload_exec_noauthSynology DiskStation Manager SLICEUPLOAD Remote Command Execution
exploit/linux/http/synology_dsm_smart_exec_authSynology DiskStation Manager smart.cgi Remote Command Execution
exploit/linux/http/tiki_calendar_execTiki-Wiki CMS Calendar Command Execution
exploit/linux/http/tp_link_ncxxx_bonjour_command_injectionTP-Link Cloud Cameras NCXXX Bonjour Command Injection
exploit/linux/http/tp_link_sc2020n_authenticated_telnet_injectionTP-Link SC2020n Authenticated Telnet Injection
exploit/linux/http/tr064_ntpserver_cmdinjectZyxel/Eir D1000 DSL Modem NewNTPServer Command Injection Over TR-064
exploit/linux/http/trend_micro_imsva_execTrend Micro InterScan Messaging Security (Virtual Appliance) Remote Code Execution
exploit/linux/http/trendmicro_imsva_widget_execTrend Micro InterScan Messaging Security (Virtual Appliance) Remote Code Execution
exploit/linux/http/trendmicro_sps_execTrend Micro Smart Protection Server Exec Remote Code Injection
exploit/linux/http/trendmicro_websecurity_execTrend Micro Web Security (Virtual Appliance) Remote Code Execution
exploit/linux/http/trueonline_billion_5200w_rceTrueOnline / Billion 5200W-T Router Unauthenticated Command Injection
exploit/linux/http/trueonline_p660hn_v1_rceTrueOnline / ZyXEL P660HN-T v1 Router Unauthenticated Command Injection
exploit/linux/http/trueonline_p660hn_v2_rceTrueOnline / ZyXEL P660HN-T v2 Router Authenticated Command Injection
exploit/linux/http/ubiquiti_airos_file_uploadUbiquiti airOS Arbitrary File Upload
exploit/linux/http/ueb_api_rceUnitrends UEB http api remote code execution
exploit/linux/http/unraid_auth_bypass_execUnraid 6.8.0 Auth Bypass PHP Code Execution
exploit/linux/http/vap2500_tools_command_execArris VAP2500 tools_command.php Command Execution
exploit/linux/http/vcms_uploadV-CMS PHP File Upload and Execute
exploit/linux/http/vestacp_execVesta Control Panel Authenticated Remote Code Execution
exploit/linux/http/vmware_nsxmgr_xstream_rce_cve_2021_39144VMware NSX Manager XStream unauthenticated RCE
exploit/linux/http/vmware_vcenter_analytics_file_uploadVMware vCenter Server Analytics (CEIP) Service File Upload
exploit/linux/http/vmware_vcenter_vsan_health_rceVMware vCenter Server Virtual SAN Health Check Plugin RCE
exploit/linux/http/vmware_view_planner_4_6_uploadlog_rceVMware View Planner Unauthenticated Log File Upload RCE
exploit/linux/http/vmware_vrops_mgr_ssrf_rceVMware vRealize Operations (vROps) Manager SSRF RCE
exploit/linux/http/vmware_workspace_one_access_cve_2022_22954VMware Workspace ONE Access CVE-2022-22954
exploit/linux/http/wanem_execWAN Emulator v2.3 Command Execution
exploit/linux/http/wd_mycloud_multiupload_uploadWestern Digital MyCloud multi_uploadify File Upload Vulnerability
exploit/linux/http/webcalendar_settings_execWebCalendar 1.2.4 Pre-Auth Remote Code Injection
exploit/linux/http/webid_converterWeBid converter.php Remote PHP Code Injection
exploit/linux/http/webmin_backdoorWebmin password_change.cgi Backdoor
exploit/linux/http/webmin_file_manager_rceWebmin File Manager RCE
exploit/linux/http/webmin_package_updates_rceWebmin Package Updates RCE
exploit/linux/http/webmin_packageup_rceWebmin Package Updates Remote Command Execution
exploit/linux/http/wepresent_cmd_injectionBarco WePresent file_transfer.cgi Command Injection
exploit/linux/http/wipg1000_cmd_injectionWePresent WiPG-1000 Command Injection
exploit/linux/http/xplico_execXplico Remote Code Execution
exploit/linux/http/zabbix_sqliZabbix 2.0.8 SQL Injection and Remote Code Execution
exploit/linux/http/zen_load_balancer_execZEN Load Balancer Filelog Command Execution
exploit/linux/http/zenoss_showdaemonxmlconfig_execZenoss 3 showDaemonXMLConfig Command Execution
exploit/linux/http/zimbra_cpio_cve_2022_41352TAR Path Traversal in Zimbra (CVE-2022-41352)
exploit/linux/http/zimbra_mboximport_cve_2022_27925Zip Path Traversal in Zimbra (mboximport) (CVE-2022-27925)
exploit/linux/http/zimbra_unrar_cve_2022_30333UnRAR Path Traversal in Zimbra (CVE-2022-30333)
exploit/linux/http/zimbra_xxe_rceZimbra Collaboration Autodiscover Servlet XXE and ProxyServlet SSRF
exploit/linux/http/zyxel_ztp_rceZyxel Firewall ZTP Unauthenticated Command Injection
exploit/linux/ids/alienvault_centerd_soap_execAlienVault OSSIM av-centerd Command Injection
exploit/linux/ids/snortbopreSnort Back Orifice Pre-Preprocessor Buffer Overflow
exploit/linux/imap/imap_uw_lsubUoW IMAP Server LSUB Buffer Overflow
exploit/linux/local/abrt_raceabrt_priv_escABRT raceabrt Privilege Escalation
exploit/linux/local/abrt_sosreport_priv_escABRT sosreport Privilege Escalation
exploit/linux/local/af_packet_chocobo_root_priv_escAF_PACKET chocobo_root Privilege Escalation
exploit/linux/local/af_packet_packet_set_ring_priv_escAF_PACKET packet_set_ring Privilege Escalation
exploit/linux/local/apport_abrt_chroot_priv_escApport / ABRT chroot Privilege Escalation
exploit/linux/local/apt_package_manager_persistenceAPT Package Manager Persistence
exploit/linux/local/asan_suid_executable_priv_escAddressSanitizer (ASan) SUID Executable Privilege Escalation
exploit/linux/local/autostart_persistenceAutostart Desktop Item Persistence
exploit/linux/local/bash_profile_persistenceBash Profile Persistence
exploit/linux/local/blueman_set_dhcp_handler_dbus_priv_escblueman set_dhcp_handler D-Bus Privilege Escalation
exploit/linux/local/bpf_priv_escLinux BPF doubleput UAF Privilege Escalation
exploit/linux/local/bpf_sign_extension_priv_escLinux BPF Sign Extension Local Privilege Escalation
exploit/linux/local/cpi_runrshell_priv_escCisco Prime Infrastructure Runrshell Privilege Escalation
exploit/linux/local/cron_persistenceCron Persistence
exploit/linux/local/cve_2021_3490_ebpf_alu32_bounds_check_lpeLinux eBPF ALU32 32-bit Invalid Bounds Tracking LPE
exploit/linux/local/cve_2021_3493_overlayfs2021 Ubuntu Overlayfs LPE
exploit/linux/local/cve_2021_38648_omigodMicrosoft OMI Management Interface Authentication Bypass
exploit/linux/local/cve_2021_4034_pwnkit_lpe_pkexecLocal Privilege Escalation in polkits pkexec
exploit/linux/local/cve_2022_0847_dirtypipeDirty Pipe Local Privilege Escalation via CVE-2022-0847
exploit/linux/local/cve_2022_0995_watch_queueWatch Queue Out of Bounds Write
exploit/linux/local/desktop_privilege_escalationDesktop Linux Password Stealer and Privilege Escalation
exploit/linux/local/diamorphine_rootkit_signal_priv_escDiamorphine Rootkit Signal Privilege Escalation
exploit/linux/local/docker_daemon_privilege_escalationDocker Daemon Privilege Escalation
exploit/linux/local/docker_privileged_container_escapeDocker Privileged Container Escape
exploit/linux/local/docker_runc_escapeDocker Container Escape Via runC Overwrite
exploit/linux/local/exim4_deliver_message_priv_escExim 4.87 - 4.91 Local Privilege Escalation
exploit/linux/local/glibc_ld_audit_dso_load_priv_escglibc LD_AUDIT Arbitrary DSO Load Privilege Escalation
exploit/linux/local/glibc_origin_expansion_priv_escglibc '$ORIGIN' Expansion Privilege Escalation
exploit/linux/local/glibc_realpath_priv_escglibc 'realpath()' Privilege Escalation
exploit/linux/local/hp_smhstartHP System Management Homepage Local Privilege Escalation
exploit/linux/local/hp_xglance_priv_escHP Performance Monitoring xglance Priv Esc
exploit/linux/local/juju_run_agent_priv_escJuju-run Agent Privilege Escalation
exploit/linux/local/kloxo_lxsuexecKloxo Local Privilege Escalation
exploit/linux/local/ktsuss_suid_priv_escktsuss suid Privilege Escalation
exploit/linux/local/lastore_daemon_dbus_priv_esclastore-daemon D-Bus Privilege Escalation
exploit/linux/local/libuser_roothelper_priv_escLibuser roothelper Privilege Escalation
exploit/linux/local/nested_namespace_idmap_limit_priv_escLinux Nested User Namespace idmap Limit Local Privilege Escalation
exploit/linux/local/netfilter_nft_set_elem_init_privescNetfilter nft_set_elem_init Heap Overflow Privilege Escalation
exploit/linux/local/netfilter_priv_esc_ipv4Linux Kernel 4.6.3 Netfilter Privilege Escalation
exploit/linux/local/netfilter_xtables_heap_oob_write_priv_escNetfilter x_tables Heap OOB Write Privilege Escalation
exploit/linux/local/network_manager_vpnc_username_priv_escNetwork Manager VPNC Username Privilege Escalation
exploit/linux/local/ntfs3g_priv_escDebian/Ubuntu ntfs-3g Local Privilege Escalation
exploit/linux/local/omniresolve_suid_priv_escMicro Focus (HPE) Data Protector SUID Privilege Escalation
exploit/linux/local/overlayfs_priv_escOverlayfs Privilege Escalation
exploit/linux/local/pihole_remove_commands_lpePi-Hole Remove Commands Linux Priv Esc
exploit/linux/local/pkexecLinux PolicyKit Race Condition Privilege Escalation
exploit/linux/local/polkit_dbus_auth_bypassPolkit D-Bus Authentication Bypass
exploit/linux/local/ptrace_sudo_token_priv_escptrace Sudo Token Privilege Escalation
exploit/linux/local/ptrace_traceme_pkexec_helperLinux Polkit pkexec helper PTRACE_TRACEME local root exploit
exploit/linux/local/rc_local_persistencerc.local Persistence
exploit/linux/local/rds_atomic_free_op_null_pointer_deref_priv_escReliable Datagram Sockets (RDS) rds_atomic_free_op NULL pointer dereference Privilege Escalation
exploit/linux/local/rds_rds_page_copy_user_priv_escReliable Datagram Sockets (RDS) rds_page_copy_user Privilege Escalation
exploit/linux/local/recvmmsg_priv_escLinux Kernel recvmmsg Privilege Escalation
exploit/linux/local/reptile_rootkit_reptile_cmd_priv_escReptile Rootkit reptile_cmd Privilege Escalation
exploit/linux/local/service_persistenceService Persistence
exploit/linux/local/servu_ftp_server_prepareinstallation_priv_escServ-U FTP Server prepareinstallation Privilege Escalation
exploit/linux/local/sock_sendpageLinux Kernel Sendpage Local Privilege Escalation
exploit/linux/local/sophos_wpa_clear_keysSophos Web Protection Appliance clear_keys.pl Local Privilege Escalation
exploit/linux/local/sudo_baron_sameditSudo Heap-Based Buffer Overflow
exploit/linux/local/su_loginLogin to Another User with Su on Linux / Unix Systems
exploit/linux/local/systemtap_modprobe_options_priv_escSystemTap MODPROBE_OPTIONS Privilege Escalation
exploit/linux/local/ubuntu_enlightenment_mount_priv_escUbuntu Enlightenment Mount Priv Esc
exploit/linux/local/udev_netlinkLinux udev Netlink Local Privilege Escalation
exploit/linux/local/ueb_bpserverd_privescUnitrends Enterprise Backup bpserverd Privilege Escalation
exploit/linux/local/ufo_privilege_escalationLinux Kernel UDP Fragmentation Offset (UFO) Privilege Escalation
exploit/linux/local/vmware_alsa_configVMware Workstation ALSA Config File Local Privilege Escalation
exploit/linux/local/vmware_mountVMWare Setuid vmware-mount Unsafe popen(3)
exploit/linux/local/vmware_workspace_one_access_certproxy_lpeVMware Workspace ONE Access CVE-2022-31660
exploit/linux/local/yum_package_manager_persistenceYum Package Manager Persistence
exploit/linux/local/zimbra_postfix_priv_escZimbra sudo + postfix privilege escalation
exploit/linux/local/zimbra_slapper_priv_escZimbra zmslapd arbitrary module load
exploit/linux/local/zpanel_zsudoZPanel zsudo Local Privilege Escalation Exploit
exploit/linux/local/zyxel_suid_cp_lpeZyxel Firewall SUID Binary Privilege Escalation
exploit/linux/misc/accellion_fta_mpipe2Accellion FTA MPIPE2 Command Execution
exploit/linux/misc/aerospike_database_udf_cmd_execAerospike Database UDF Lua Code Execution
exploit/linux/misc/asus_infosvr_auth_bypass_execASUS infosvr Auth Bypass Command Execution
exploit/linux/misc/cisco_rv340_sslvpnCisco RV340 SSL VPN Unauthenticated Remote Code Execution
exploit/linux/misc/cve_2020_13160_anydeskAnyDesk GUI Format String Write
exploit/linux/misc/cve_2021_38647_omigodMicrosoft OMI Management Interface Authentication Bypass
exploit/linux/misc/gld_postfixGLD (Greylisting Daemon) Postfix Buffer Overflow
exploit/linux/misc/hid_discoveryd_command_blink_on_unauth_rceHID discoveryd command_blink_on Unauthenticated RCE
exploit/linux/misc/hikvision_rtsp_bofHikvision DVR RTSP Request Remote Code Execution
exploit/linux/misc/hp_data_protector_cmd_execHP Data Protector 6 EXEC_CMD Remote Code Execution
exploit/linux/misc/hp_jetdirect_path_traversalHP Jetdirect Path Traversal Arbitrary Code Execution
exploit/linux/misc/hplip_hpssd_execHPLIP hpssd.py From Address Arbitrary Command Execution
exploit/linux/misc/hp_nnmi_pmd_bofHP Network Node Manager I PMD Buffer Overflow
exploit/linux/misc/hp_vsa_login_bofHP StorageWorks P4000 Virtual SAN Appliance Login Buffer Overflow
exploit/linux/misc/ib_inet_connectBorland InterBase INET_connect() Buffer Overflow
exploit/linux/misc/ib_jrd8_create_databaseBorland InterBase jrd8_create_database() Buffer Overflow
exploit/linux/misc/ib_open_marker_fileBorland InterBase open_marker_file() Buffer Overflow
exploit/linux/misc/ib_pwd_db_aliasedBorland InterBase PWD_db_aliased() Buffer Overflow
exploit/linux/misc/igel_command_injectionIGEL OS Secure VNC/Terminal Command Injection RCE
exploit/linux/misc/jenkins_java_deserializeJenkins CLI RMI Java Deserialization Vulnerability
exploit/linux/misc/jenkins_ldap_deserializeJenkins CLI HTTP Java Deserialization Vulnerability
exploit/linux/misc/lprng_format_stringLPRng use_syslog Remote Format String Vulnerability
exploit/linux/misc/mongod_native_helperMongoDB nativeHelper.apply Remote Code Execution
exploit/linux/misc/nagios_nrpe_argumentsNagios Remote Plugin Executor Arbitrary Command Execution
exploit/linux/misc/netcore_udp_53413_backdoorNetcore Router Udp 53413 Backdoor
exploit/linux/misc/netsupport_manager_agentNetSupport Manager Agent Remote Buffer Overflow
exploit/linux/misc/nimbus_gettopologyhistory_cmd_execApache Storm Nimbus getTopologyHistory Unauthenticated Command Execution
exploit/linux/misc/novell_edirectory_ncp_bofNovell eDirectory 8 Buffer Overflow
exploit/linux/misc/opennms_java_serializeOpenNMS Java Object Unserialization Remote Code Execution
exploit/linux/misc/qnap_transcode_serverQNAP Transcode Server Command Execution
exploit/linux/misc/quest_pmmasterd_bofQuest Privilege Manager pmmasterd Buffer Overflow
exploit/linux/misc/saltstack_salt_unauth_rceSaltStack Salt Master/Minion Unauthenticated RCE
exploit/linux/misc/sercomm_execSerComm Device Remote Code Execution
exploit/linux/misc/tplink_archer_a7_c7_lan_rceTP-Link Archer A7/C7 Unauthenticated LAN Remote Code Execution
exploit/linux/misc/ueb9_bpserverdUnitrends UEB bpserverd authentication bypass RCE
exploit/linux/misc/zabbix_server_execZabbix Server Arbitrary Command Execution
exploit/linux/mysql/mysql_yassl_getnameMySQL yaSSL CertDecoder::GetName Buffer Overflow
exploit/linux/mysql/mysql_yassl_helloMySQL yaSSL SSL Hello Message Buffer Overflow
exploit/linux/pop3/cyrus_pop3d_popsubfoldersCyrus IMAPD pop3d popsubfolders USER Buffer Overflow
exploit/linux/postgres/postgres_payloadPostgreSQL for Linux Payload Execution
exploit/linux/pptp/poptop_negative_readPoptop Negative Read Overflow
exploit/linux/proxy/squid_ntlm_authenticateSquid NTLM Authenticate Overflow
exploit/linux/redis/redis_debian_sandbox_escapeRedis Lua Sandbox Escape
exploit/linux/redis/redis_replication_cmd_execRedis Replication Code Execution
exploit/linux/samba/chain_replySamba chain_reply Memory Corruption (Linux x86)
exploit/linux/samba/is_known_pipenameSamba is_known_pipename() Arbitrary Module Load
exploit/linux/samba/lsa_transnames_heapSamba lsa_io_trans_names Heap Overflow
exploit/linux/samba/setinfopolicy_heapSamba SetInformationPolicy AuditEventsInfo Heap Overflow
exploit/linux/samba/trans2openSamba trans2open Overflow (Linux x86)
exploit/linux/smtp/apache_james_execApache James Server 2.3.2 Insecure User Creation Arbitrary File Write
exploit/linux/smtp/exim4_dovecot_execExim and Dovecot Insecure Configuration Command Injection
exploit/linux/smtp/exim_gethostbyname_bofExim GHOST (glibc gethostbyname) Buffer Overflow
exploit/linux/smtp/harakaHaraka SMTP Command Injection
exploit/linux/snmp/awind_snmp_execAwindInc SNMP Service Command Injection
exploit/linux/snmp/net_snmpd_rw_accessNet-SNMPd Write Access SNMP-EXTEND-MIB arbitrary code execution
exploit/linux/ssh/ceragon_fibeair_known_privkeyCeragon FibeAir IP-10 SSH Private Key Exposure
exploit/linux/ssh/cisco_ucs_scpuserCisco UCS Director default scpuser password
exploit/linux/ssh/exagrid_known_privkeyExaGrid Known SSH Key and Default Password
exploit/linux/ssh/f5_bigip_known_privkeyF5 BIG-IP SSH Private Key Exposure
exploit/linux/ssh/ibm_drm_a3userIBM Data Risk Manager a3user Default Password
exploit/linux/ssh/loadbalancerorg_enterprise_known_privkeyLoadbalancer.org Enterprise VA SSH Private Key Exposure
exploit/linux/ssh/mercurial_ssh_execMercurial Custom hg-ssh Wrapper Remote Code Exec
exploit/linux/ssh/microfocus_obr_shrboadminMicro Focus Operations Bridge Reporter shrboadmin default password
exploit/linux/ssh/quantum_dxi_known_privkeyQuantum DXi V1000 SSH Private Key Exposure
exploit/linux/ssh/quantum_vmpro_backdoorQuantum vmPRO Backdoor Command
exploit/linux/ssh/solarwinds_lem_execSolarWinds LEM Default SSH Password Remote Code Execution
exploit/linux/ssh/symantec_smg_sshSymantec Messaging Gateway 9.5 Default SSH Password Vulnerability
exploit/linux/ssh/vmware_vdp_known_privkeyVMware VDP Known SSH Key
exploit/linux/ssh/vyos_restricted_shell_privescVyOS restricted-shell Escape and Privilege Escalation
exploit/linux/telnet/netgear_telnetenableNETGEAR TelnetEnable
exploit/linux/telnet/telnet_encrypt_keyidLinux BSD-derived Telnet Service Encryption Key ID Buffer Overflow
exploit/linux/upnp/belkin_wemo_upnp_execBelkin Wemo UPnP Remote Code Execution
exploit/linux/upnp/dlink_dir859_exec_ssdpcgiD-Link Devices Unauthenticated Remote Command Execution in ssdpcgi
exploit/linux/upnp/dlink_dir859_subscribe_execD-Link DIR-859 Unauthenticated Remote Command Execution
exploit/linux/upnp/dlink_upnp_msearch_execD-Link Unauthenticated UPnP M-SEARCH Multicast Command Injection
exploit/linux/upnp/miniupnpd_soap_bofMiniUPnPd 1.0 Stack Buffer Overflow Remote Code Execution
exploit/mainframe/ftp/ftp_jcl_credsFTP JCL Execution
exploit/multi/browser/adobe_flash_hacking_team_uafAdobe Flash Player ByteArray Use After Free
exploit/multi/browser/adobe_flash_nellymoser_bofAdobe Flash Player Nellymoser Audio Decoding Buffer Overflow
exploit/multi/browser/adobe_flash_net_connection_confusionAdobe Flash Player NetConnection Type Confusion
exploit/multi/browser/adobe_flash_opaque_background_uafAdobe Flash opaqueBackground Use After Free
exploit/multi/browser/adobe_flash_pixel_bender_bofAdobe Flash Player Shader Buffer Overflow
exploit/multi/browser/adobe_flash_shader_drawing_fillAdobe Flash Player Drawing Fill Shader Memory Corruption
exploit/multi/browser/adobe_flash_shader_job_overflowAdobe Flash Player ShaderJob Buffer Overflow
exploit/multi/browser/adobe_flash_uncompress_zlib_uafAdobe Flash Player ByteArray UncompressViaZlibVariant Use After Free
exploit/multi/browser/chrome_array_mapGoogle Chrome 72 and 73 Array.map exploit
exploit/multi/browser/chrome_cve_2021_21220_v8_insufficient_validationGoogle Chrome versions before 89.0.4389.128 V8 XOR Typer Out-Of-Bounds Access RCE
exploit/multi/browser/chrome_jscreate_sideeffectGoogle Chrome 80 JSCreate side-effect type confusion exploit
exploit/multi/browser/chrome_object_createGoogle Chrome 67, 68 and 69 Object.create exploit
exploit/multi/browser/chrome_simplifiedlowering_overflowGoogle Chrome versions before 87.0.4280.88 integer overflow during SimplfiedLowering phase
exploit/multi/browser/firefox_escape_retvalFirefox 3.5 escape() Return Value Memory Corruption
exploit/multi/browser/firefox_jit_use_after_freeFirefox MCallGetProperty Write Side Effects Use After Free Exploit
exploit/multi/browser/firefox_pdfjs_privilege_escalationFirefox PDF.js Privileged Javascript Injection
exploit/multi/browser/firefox_proto_crmfrequestFirefox 5.0 - 15.0.1 exposedProps XCS Code Execution
exploit/multi/browser/firefox_proxy_prototypeFirefox Proxy Prototype Privileged Javascript Injection
exploit/multi/browser/firefox_queryinterfaceFirefox location.QueryInterface() Code Execution
exploit/multi/browser/firefox_svg_pluginFirefox 17.0.1 Flash Privileged Code Injection
exploit/multi/browser/firefox_tostring_console_injectionFirefox toString console.time Privileged Javascript Injection
exploit/multi/browser/firefox_webidl_injectionFirefox WebIDL Privileged Javascript Injection
exploit/multi/browser/firefox_xpi_bootstrapped_addonMozilla Firefox Bootstrapped Addon Social Engineering Code Execution
exploit/multi/browser/itms_overflowApple OS X iTunes 8.1.1 ITMS Overflow
exploit/multi/browser/java_atomicreferencearrayJava AtomicReferenceArray Type Violation Vulnerability
exploit/multi/browser/java_calendar_deserializeSun Java Calendar Deserialization Privilege Escalation
exploit/multi/browser/java_getsoundbank_bofSun Java JRE getSoundbank file:// URI Buffer Overflow
exploit/multi/browser/java_jre17_driver_managerJava Applet Driver Manager Privileged toString() Remote Code Execution
exploit/multi/browser/java_jre17_execJava 7 Applet Remote Code Execution
exploit/multi/browser/java_jre17_glassfish_averagerangestatisticimplJava Applet AverageRangeStatisticImpl Remote Code Execution
exploit/multi/browser/java_jre17_jaxwsJava Applet JAX-WS Remote Code Execution
exploit/multi/browser/java_jre17_jmxbean_2Java Applet JMX Remote Code Execution
exploit/multi/browser/java_jre17_jmxbeanJava Applet JMX Remote Code Execution
exploit/multi/browser/java_jre17_method_handleJava Applet Method Handle Remote Code Execution
exploit/multi/browser/java_jre17_provider_skeletonJava Applet ProviderSkeleton Insecure Invoke Method
exploit/multi/browser/java_jre17_reflection_typesJava Applet Reflection Type Confusion Remote Code Execution
exploit/multi/browser/java_rhinoJava Applet Rhino Script Engine Remote Code Execution
exploit/multi/browser/java_rmi_connection_implJava RMIConnectionImpl Deserialization Privilege Escalation
exploit/multi/browser/java_setdifficm_bofSun Java JRE AWT setDiffICM Buffer Overflow
exploit/multi/browser/java_signed_appletJava Signed Applet Social Engineering Code Execution
exploit/multi/browser/java_storeimagearrayJava storeImageArray() Invalid Array Indexing Vulnerability
exploit/multi/browser/java_trusted_chainJava Statement.invoke() Trusted Method Chain Privilege Escalation
exploit/multi/browser/java_verifier_field_accessJava Applet Field Bytecode Verifier Cache Remote Code Execution
exploit/multi/browser/mozilla_comparetoMozilla Suite/Firefox compareTo() Code Execution
exploit/multi/browser/mozilla_navigatorjavaMozilla Suite/Firefox Navigator Object Code Execution
exploit/multi/browser/msfd_rce_browserMetasploit msfd Remote Code Execution via Browser
exploit/multi/browser/opera_configoverwriteOpera 9 Configuration Overwrite
exploit/multi/browser/opera_historysearchOpera historysearch XSS
exploit/multi/browser/qtjava_pointerApple QTJava toQTPointer() Arbitrary Memory Access
exploit/multi/elasticsearch/script_mvel_rceElasticSearch Dynamic Script Arbitrary Java Execution
exploit/multi/elasticsearch/search_groovy_scriptElasticSearch Search Groovy Sandbox Bypass
exploit/multi/fileformat/adobe_u3d_meshcontAdobe U3D CLODProgressiveMeshDeclaration Array Overrun
exploit/multi/fileformat/archive_tar_arb_file_writePEAR Archive_Tar 1.4.10 Arbitrary File Write
exploit/multi/fileformat/evince_cbt_cmd_injectionEvince CBT File Command Injection
exploit/multi/fileformat/ghostscript_failed_restoreGhostscript Failed Restore Command Execution
exploit/multi/fileformat/js_unpacker_eval_injectionJavascript Injection for Eval-based Unpackers
exploit/multi/fileformat/libreoffice_logo_execLibreOffice Macro Python Code Execution
exploit/multi/fileformat/libreoffice_macro_execLibreOffice Macro Code Execution
exploit/multi/fileformat/maple_mapletMaple Maplet File Creation and Command Execution
exploit/multi/fileformat/nodejs_js_yaml_load_code_execNodejs js-yaml load() Code Execution
exploit/multi/fileformat/office_word_macroMicrosoft Office Word Malicious Macro Execution
exploit/multi/fileformat/peazip_command_injectionPeaZip Zip Processing Command Injection
exploit/multi/fileformat/swagger_param_injectJSON Swagger CodeGen Parameter Injector
exploit/multi/fileformat/zip_slipGeneric Zip Slip Traversal Vulnerability
exploit/multi/ftp/pureftpd_bash_env_execPure-FTPd External Authentication Bash Environment Variable Code Injection (Shellshock)
exploit/multi/ftp/wuftpd_site_exec_formatWU-FTPD SITE EXEC/INDEX Format String Vulnerability
exploit/multi/gdb/gdb_server_execGDB Server Remote Payload Execution
exploit/multi/hams/steamedSteamed Hams
exploit/multi/handlerGeneric Payload Handler
exploit/multi/http/activecollab_chatActive Collab "chat module" Remote PHP Code Injection Exploit
exploit/multi/http/agent_tesla_panel_rceAgent Tesla Panel Remote Code Execution
exploit/multi/http/ajaxplorer_checkinstall_execAjaXplorer checkInstall.php Remote Command Execution
exploit/multi/http/apache_activemq_upload_jspActiveMQ web shell upload
exploit/multi/http/apache_apisix_api_default_token_rceAPISIX Admin API default access token RCE
exploit/multi/http/apache_couchdb_erlang_rceApache Couchdb Erlang RCE
exploit/multi/http/apache_flink_jar_upload_execApache Flink JAR Upload Java Code Execution
exploit/multi/http/apache_jetspeed_file_uploadApache Jetspeed Arbitrary File Upload
exploit/multi/http/apache_mod_cgi_bash_env_execApache mod_cgi Bash Environment Variable Code Injection (Shellshock)
exploit/multi/http/apache_nifi_processor_rceApache NiFi API Remote Code Execution
exploit/multi/http/apache_normalize_path_rceApache 2.4.49/2.4.50 Traversal RCE
exploit/multi/http/apache_roller_ognl_injectionApache Roller OGNL Injection
exploit/multi/http/apprain_upload_execappRain CMF Arbitrary PHP File Upload Vulnerability
exploit/multi/http/atlassian_confluence_namespace_ognl_injectionAtlassian Confluence Namespace OGNL Injection
exploit/multi/http/atlassian_confluence_webwork_ognl_injectionAtlassian Confluence WebWork OGNL Injection
exploit/multi/http/atlassian_crowd_pdkinstall_plugin_upload_rceAtlassian Crowd pdkinstall Unauthenticated Plugin Upload RCE
exploit/multi/http/atutor_sqliATutor 2.2.1 SQL Injection / Remote Code Execution
exploit/multi/http/atutor_upload_traversalATutor 2.2.4 - Directory Traversal / Remote Code Execution,
exploit/multi/http/auxilium_upload_execAuxilium RateMyPet Arbitrary File Upload Vulnerability
exploit/multi/http/axis2_deployerAxis2 / SAP BusinessObjects Authenticated Code Execution (via SOAP)
exploit/multi/http/baldr_upload_execBaldr Botnet Panel Shell Upload Exploit
exploit/multi/http/bassmaster_js_injectionBassmaster Batch Arbitrary JavaScript Injection Remote Code Execution
exploit/multi/http/bolt_file_uploadCMS Bolt File Upload Vulnerability
exploit/multi/http/builderengine_upload_execBuilderEngine Arbitrary File Upload Vulnerability and execution
exploit/multi/http/caidao_php_backdoor_execChina Chopper Caidao PHP Backdoor Code Execution
exploit/multi/http/churchinfo_upload_execChurchInfo 1.2.13-1.3.0 Authenticated RCE
exploit/multi/http/cisco_dcnm_upload_2019Cisco Data Center Network Manager Unauthenticated Remote Code Execution
exploit/multi/http/cisco_dcnm_uploadCisco Prime Data Center Network Manager Arbitrary File Upload
exploit/multi/http/clipbucket_fileupload_execClipBucket beats_uploader Unauthenticated Arbitrary File Upload
exploit/multi/http/cmsms_object_injection_rceCMS Made Simple Authenticated RCE via object injection
exploit/multi/http/cmsms_showtime2_rceCMS Made Simple (CMSMS) Showtime2 File Upload RCE
exploit/multi/http/cmsms_upload_rename_rceCMS Made Simple Authenticated RCE via File Upload/Copy
exploit/multi/http/cockpit_cms_rceCockpit CMS NoSQLi to RCE
exploit/multi/http/coldfusion_ckeditor_file_uploadAdobe ColdFusion CKEditor unrestricted file upload
exploit/multi/http/coldfusion_rds_auth_bypassAdobe ColdFusion RDS Authentication Bypass
exploit/multi/http/confluence_widget_connectorAtlassian Confluence Widget Connector Macro Velocity Template Injection
exploit/multi/http/cups_bash_env_execCUPS Filter Bash Environment Variable Code Injection (Shellshock)
exploit/multi/http/cuteflow_upload_execCuteFlow v2.11.2 Arbitrary File Upload Vulnerability
exploit/multi/http/cve_2021_35464_forgerock_openamForgeRock / OpenAM Jato Java Deserialization
exploit/multi/http/dexter_casinoloader_execDexter (CasinoLoader) SQL Injection
exploit/multi/http/dotcms_file_upload_rceDotCMS RCE via Arbitrary File Upload.
exploit/multi/http/drupal_drupageddonDrupal HTTP Parameter Key/Value SQL Injection
exploit/multi/http/eaton_nsm_code_execNetwork Shutdown Module (sort_values) Remote PHP Code Injection
exploit/multi/http/eventlog_file_uploadManageEngine Eventlog Analyzer Arbitrary File Upload
exploit/multi/http/extplorer_upload_execeXtplorer v2.1 Arbitrary File Upload Vulnerability
exploit/multi/http/familycms_less_execFamily Connections less.php Remote Command Execution
exploit/multi/http/freenas_exec_rawFreeNAS exec_raw.php Arbitrary Command Execution
exploit/multi/http/gestioip_execGestioIP Remote Command Execution
exploit/multi/http/getsimplecms_unauth_code_execGetSimpleCMS Unauthenticated RCE
exploit/multi/http/git_client_command_execMalicious Git and Mercurial HTTP Server For CVE-2014-9390
exploit/multi/http/gitea_git_fetch_rceGitea Git Fetch Remote Code Execution
exploit/multi/http/gitea_git_hooks_rceGitea Git Hooks Remote Code Execution
exploit/multi/http/gitlab_exif_rceGitLab Unauthenticated Remote ExifTool Command Injection
exploit/multi/http/gitlab_file_read_rceGitLab File Read Remote Code Execution
exploit/multi/http/gitlab_shell_execGitlab-shell Code Execution
exploit/multi/http/git_lfs_clone_command_execGit LFS Clone Command Exec
exploit/multi/http/gitlist_arg_injectionGitList v0.6.0 Argument Injection Vulnerability
exploit/multi/http/gitorious_graphGitorious Arbitrary Command Execution
exploit/multi/http/git_submodule_command_execMalicious Git HTTP Server For CVE-2017-1000117
exploit/multi/http/git_submodule_url_execMalicious Git HTTP Server For CVE-2018-17456
exploit/multi/http/glassfish_deployerSun/Oracle GlassFish Server Authenticated Code Execution
exploit/multi/http/glossword_upload_execGlossword v1.8.8 - 1.8.12 Arbitrary File Upload Vulnerability
exploit/multi/http/glpi_install_rceGLPI install.php Remote Command Execution
exploit/multi/http/gogs_git_hooks_rceGogs Git Hooks Remote Code Execution
exploit/multi/http/horde_csv_rceHorde CSV import arbitrary PHP code execution
exploit/multi/http/horde_form_file_uploadHorde Form File Upload Vulnerability
exploit/multi/http/horde_href_backdoorHorde 3.3.12 Backdoor Arbitrary PHP Code Execution
exploit/multi/http/horizontcms_upload_execHorizontCMS Arbitrary PHP File Upload
exploit/multi/http/hp_sitescope_issuesiebelcmdHP SiteScope issueSiebelCmd Remote Code Execution
exploit/multi/http/hp_sitescope_uploadfileshandlerHP SiteScope Remote Code Execution
exploit/multi/http/hp_sys_mgmt_execHP System Management Homepage JustGetSNMPQueue Command Injection
exploit/multi/http/hyperic_hq_script_consoleVMware Hyperic HQ Groovy Script-Console Java Execution
exploit/multi/http/ibm_openadmin_tool_soap_welcomeserver_execIBM OpenAdmin Tool SOAP welcomeServer PHP Code Execution
exploit/multi/http/ispconfig_php_execISPConfig Authenticated Arbitrary PHP Code Execution
exploit/multi/http/jboss_bshdeployerJBoss JMX Console Beanshell Deployer WAR Upload and Deployment
exploit/multi/http/jboss_deploymentfilerepositoryJBoss Java Class DeploymentFileRepository WAR Deployment
exploit/multi/http/jboss_invoke_deployJBoss DeploymentFileRepository WAR Deployment (via JMXInvokerServlet)
exploit/multi/http/jboss_maindeployerJBoss JMX Console Deployer Upload and Execute
exploit/multi/http/jboss_seam_upload_execJBoss Seam 2 File Upload and Execute
exploit/multi/http/jenkins_metaprogrammingJenkins ACL Bypass and Metaprogramming RCE
exploit/multi/http/jenkins_script_consoleJenkins-CI Script-Console Java Execution
exploit/multi/http/jenkins_xstream_deserializeJenkins XStream Groovy classpath Deserialization Vulnerability
exploit/multi/http/jira_hipchat_templateAtlassian HipChat for Jira Plugin Velocity Template Injection
exploit/multi/http/jira_plugin_uploadAtlassian Jira Authenticated Upload Code Execution
exploit/multi/http/joomla_http_header_rceJoomla HTTP Header Unauthenticated Remote Code Execution
exploit/multi/http/kong_gateway_admin_api_rceKong Gateway Admin API Remote Code Execution
exploit/multi/http/kordil_edms_upload_execKordil EDMS v2.2.60rc3 Unauthenticated Arbitrary File Upload Vulnerability
exploit/multi/http/lcms_php_execLotusCMS 3.0 eval() Remote Command Execution
exploit/multi/http/liferay_java_unmarshallingLiferay Portal Java Unmarshalling via JSONWS RCE
exploit/multi/http/log1cms_ajax_create_folderLog1 CMS writeInfo() PHP Code Injection
exploit/multi/http/log4shell_header_injectionLog4Shell HTTP Header Injection
exploit/multi/http/magento_unserializeMagento 2.0.6 Unserialize Remote Code Execution
exploit/multi/http/makoserver_cmd_execMako Server v2.5, 2.6 OS Command Injection RCE
exploit/multi/http/manageengine_auth_uploadManageEngine Multiple Products Authenticated File Upload
exploit/multi/http/manage_engine_dc_pmp_sqliManageEngine Desktop Central / Password Manager LinkViewFetchServlet.dat SQL Injection
exploit/multi/http/manageengine_sd_uploaderManageEngine ServiceDesk Plus Arbitrary File Upload
exploit/multi/http/manageengine_search_sqliManageEngine Security Manager Plus 5.5 Build 5505 SQL Injection
exploit/multi/http/mantisbt_manage_proj_page_rceMantis manage_proj_page PHP Code Execution
exploit/multi/http/mantisbt_php_execMantisBT XmlImportExport Plugin PHP Code Injection Vulnerability
exploit/multi/http/maracms_upload_execMaraCMS Arbitrary PHP File Upload
exploit/multi/http/mediawiki_syntaxhighlightMediaWiki SyntaxHighlight extension option injection vulnerability
exploit/multi/http/mediawiki_thumbMediaWiki Thumb.php Remote Command Execution
exploit/multi/http/metasploit_static_secret_key_baseMetasploit Web UI Static secret_key_base Value
exploit/multi/http/metasploit_webui_console_command_executionMetasploit Web UI Diagnostic Console Command Execution
exploit/multi/http/microfocus_obm_auth_rceMicro Focus Operations Bridge Manager Authenticated Remote Code Execution
exploit/multi/http/microfocus_ucmdb_unauth_deserMicro Focus UCMDB Java Deserialization Unauthenticated Remote Code Execution
exploit/multi/http/mma_backdoor_uploadTh3 MMA mma.php Backdoor Arbitrary File Upload
exploit/multi/http/mobilecartly_upload_execMobileCartly 1.0 Arbitrary File Creation Vulnerability
exploit/multi/http/monstra_fileupload_execMonstra CMS Authenticated Arbitrary File Upload
exploit/multi/http/moodle_admin_shell_uploadMoodle Admin Shell Upload
exploit/multi/http/moodle_cmd_execMoodle Remote Command Execution
exploit/multi/http/moodle_spelling_binary_rceMoodle Authenticated Spelling Binary RCE
exploit/multi/http/moodle_spelling_path_rceMoodle SpellChecker Path Authenticated Remote Command Execution
exploit/multi/http/moodle_teacher_enrollment_priv_esc_to_rceMoodle Teacher Enrollment Privilege Escalation to RCE
exploit/multi/http/movabletype_upgrade_execMovable Type 4.2x, 4.3x Web Upgrade Remote Code Execution
exploit/multi/http/mutiny_subnetmask_execMutiny Remote Command Execution
exploit/multi/http/mybb_rce_cve_2022_24734MyBB Admin Control Code Injection RCE
exploit/multi/http/nas4free_php_execNAS4Free Arbitrary Remote Code Execution
exploit/multi/http/navigate_cms_rceNavigate CMS Unauthenticated Remote Code Execution
exploit/multi/http/netwin_surgeftp_execNetwin SurgeFTP Remote Command Execution
exploit/multi/http/nibbleblog_file_uploadNibbleblog File Upload Vulnerability
exploit/multi/http/nostromo_code_execNostromo Directory Traversal Remote Command Execution
exploit/multi/http/novell_servicedesk_rceNovell ServiceDesk Authenticated File Upload
exploit/multi/http/nuuo_nvrmini_upgrade_rceNUUO NVRmini upgrade_handle.php Remote Command Execution
exploit/multi/http/october_upload_bypass_execOctober CMS Upload Protection Bypass Code Execution
exploit/multi/http/op5_licenseOP5 license.php Remote Command Execution
exploit/multi/http/op5_welcomeOP5 welcome Remote Command Execution
exploit/multi/http/openfire_auth_bypassOpenfire Admin Console Authentication Bypass
exploit/multi/http/openmediavault_cmd_execOpenMediaVault Cron Remote Command Execution
exploit/multi/http/openmrs_deserializationOpenMRS Java Deserialization RCE
exploit/multi/http/openx_backdoor_phpOpenX Backdoor PHP Code Execution
exploit/multi/http/opmanager_socialit_file_uploadManageEngine OpManager and Social IT Arbitrary File Upload
exploit/multi/http/opmanager_sumpdu_deserializationManageEngine OpManager SumPDU Java Deserialization
exploit/multi/http/oracle_ats_file_uploadOracle ATS Arbitrary File Upload
exploit/multi/http/oracle_reports_rceOracle Forms and Reports Remote Code Execution
exploit/multi/http/oracle_weblogic_wsat_deserialization_rceOracle WebLogic wls-wsat Component Deserialization RCE
exploit/multi/http/orientdb_execOrientDB 2.2.x Remote Code Execution
exploit/multi/http/oscommerce_installer_unauth_code_execosCommerce Installer Unauthenticated Code Execution
exploit/multi/http/pandora_upload_execPandora FMS v3.1 Auth Bypass and Arbitrary File Upload Vulnerability
exploit/multi/http/phoenix_execPhoenix Exploit Kit Remote Code Execution
exploit/multi/http/php_cgi_arg_injectionPHP CGI Argument Injection
exploit/multi/http/phpfilemanager_rcephpFileManager 0.9.8 Remote Code Execution
exploit/multi/http/php_fpm_rcePHP-FPM Underflow RCE
exploit/multi/http/phpldapadmin_query_enginephpLDAPadmin query_engine Remote PHP Code Injection
exploit/multi/http/phpmailer_arg_injectionPHPMailer Sendmail Argument Injection
exploit/multi/http/phpmoadmin_execPHPMoAdmin 1.1.2 Remote Code Execution
exploit/multi/http/phpmyadmin_3522_backdoorphpMyAdmin 3.5.2.2 server_sync.php Backdoor
exploit/multi/http/phpmyadmin_lfi_rcephpMyAdmin Authenticated Remote Code Execution
exploit/multi/http/phpmyadmin_null_termination_execphpMyAdmin Authenticated Remote Code Execution
exploit/multi/http/phpmyadmin_preg_replacephpMyAdmin Authenticated Remote Code Execution via preg_replace()
exploit/multi/http/phpscheduleit_start_datephpScheduleIt PHP reserve.php start_date Parameter Arbitrary Code Injection
exploit/multi/http/phpstudy_backdoor_rcePHPStudy Backdoor Remote Code execution
exploit/multi/http/phptax_execPhpTax pfilez Parameter Exec Remote Code Injection
exploit/multi/http/php_utility_belt_rcePHP Utility Belt Remote Code Execution
exploit/multi/http/php_volunteer_upload_execPHP Volunteer Management System v1.0.2 Arbitrary File Upload Vulnerability
exploit/multi/http/phpwiki_ploticus_execPhpwiki Ploticus Remote Code Execution
exploit/multi/http/pimcore_unserialize_rcePimcore Unserialize RCE
exploit/multi/http/playsms_filename_execPlaySMS sendfromfile.php Authenticated "Filename" Field Code Execution
exploit/multi/http/playsms_template_injectionPlaySMS index.php Unauthenticated Template Injection Code Execution
exploit/multi/http/playsms_uploadcsv_execPlaySMS import.php Authenticated CSV File Upload Code Execution
exploit/multi/http/plone_popen2Plone and Zope XMLTools Remote Command Execution
exploit/multi/http/pmwiki_pagelistPmWiki pagelist.php Remote PHP Code Injection Exploit
exploit/multi/http/polarcms_upload_execPolarBear CMS PHP File Upload Vulnerability
exploit/multi/http/processmaker_execProcessMaker Open Source Authenticated PHP Code Execution
exploit/multi/http/processmaker_plugin_uploadProcessMaker Plugin Upload
exploit/multi/http/qdpm_authenticated_rceqdPM 9.1 Authenticated Arbitrary PHP File Upload (RCE)
exploit/multi/http/qdpm_upload_execqdPM v7 Arbitrary PHP File Upload Vulnerability
exploit/multi/http/rails_actionpack_inline_execRuby on Rails ActionPack Inline ERB Code Execution
exploit/multi/http/rails_double_tapRuby On Rails DoubleTap Development Mode secret_key_base Vulnerability
exploit/multi/http/rails_dynamic_render_code_execRuby on Rails Dynamic Render File Upload Remote Code Execution
exploit/multi/http/rails_json_yaml_code_execRuby on Rails JSON Processor YAML Deserialization Code Execution
exploit/multi/http/rails_secret_deserializationRuby on Rails Known Secret Session Cookie Remote Code Execution
exploit/multi/http/rails_web_console_v2_code_execRuby on Rails Web Console (v2) Whitelist Bypass Code Execution
exploit/multi/http/rails_xml_yaml_code_execRuby on Rails XML Processor YAML Deserialization Code Execution
exploit/multi/http/rocket_servergraph_file_requestor_rceRocket Servergraph Admin Center fileRequestor Remote Code Execution
exploit/multi/http/sflog_upload_execSflog! CMS 1.0 Arbitrary File Upload Vulnerability
exploit/multi/http/shiro_rememberme_v124_deserializeApache Shiro v1.2.4 Cookie RememberME Deserial RCE
exploit/multi/http/shopware_createinstancefromnamedarguments_rceShopware createInstanceFromNamedArguments PHP Object Instantiation RCE
exploit/multi/http/simple_backdoors_execSimple Backdoor Shell Remote Code Execution
exploit/multi/http/sit_file_uploadSupport Incident Tracker Remote Command Execution
exploit/multi/http/snortreport_execSnortreport nmap.php/nbtscan.php Remote Command Execution
exploit/multi/http/solarwinds_store_manager_auth_filterSolarWinds Storage Manager Authentication Bypass
exploit/multi/http/solr_velocity_rceApache Solr Remote Code Execution via Velocity Template
exploit/multi/http/sonicwall_gms_uploadSonicWALL GMS 6 Arbitrary File Upload
exploit/multi/http/sonicwall_scrutinizer_methoddetail_sqliDell SonicWALL Scrutinizer 11.01 methodDetail SQL Injection
exploit/multi/http/splunk_mappy_execSplunk Search Remote Code Execution
exploit/multi/http/splunk_upload_app_execSplunk Custom App Remote Code Execution
exploit/multi/http/spree_search_execSpreecommerce 0.60.1 Arbitrary Command Execution
exploit/multi/http/spree_searchlogic_execSpreecommerce Arbitrary Command Execution
exploit/multi/http/spring_cloud_function_spel_injectionSpring Cloud Function SpEL Injection
exploit/multi/http/spring_framework_rce_spring4shellSpring Framework Class property RCE (Spring4Shell)
exploit/multi/http/struts2_code_exec_showcaseApache Struts 2 Struts 1 Plugin Showcase OGNL Code Execution
exploit/multi/http/struts2_content_type_ognlApache Struts Jakarta Multipart Parser OGNL Injection
exploit/multi/http/struts2_multi_eval_ognlApache Struts 2 Forced Multi OGNL Evaluation
exploit/multi/http/struts2_namespace_ognlApache Struts 2 Namespace Redirect OGNL Injection
exploit/multi/http/struts2_rest_xstreamApache Struts 2 REST Plugin XStream RCE
exploit/multi/http/struts_code_exec_classloaderApache Struts ClassLoader Manipulation Remote Code Execution
exploit/multi/http/struts_code_exec_exception_delegatorApache Struts Remote Command Execution
exploit/multi/http/struts_code_execApache Struts Remote Command Execution
exploit/multi/http/struts_code_exec_parametersApache Struts ParametersInterceptor Remote Code Execution
exploit/multi/http/struts_default_action_mapperApache Struts 2 DefaultActionMapper Prefixes OGNL Code Execution
exploit/multi/http/struts_dev_modeApache Struts 2 Developer Mode OGNL Execution
exploit/multi/http/struts_dmi_execApache Struts Dynamic Method Invocation Remote Code Execution
exploit/multi/http/struts_dmi_rest_execApache Struts REST Plugin With Dynamic Method Invocation Remote Code Execution
exploit/multi/http/struts_include_paramsApache Struts includeParams Remote Code Execution
exploit/multi/http/stunshell_evalSTUNSHELL Web Shell Remote PHP Code Execution
exploit/multi/http/stunshell_execSTUNSHELL Web Shell Remote Code Execution
exploit/multi/http/sun_jsws_dav_optionsSun Java System Web Server WebDAV OPTIONS Buffer Overflow
exploit/multi/http/sysaid_auth_file_uploadSysAid Help Desk Administrator Portal Arbitrary File Upload
exploit/multi/http/sysaid_rdslogs_file_uploadSysAid Help Desk 'rdslogs' Arbitrary File Upload
exploit/multi/http/testlink_upload_execTestLink v1.9.3 Arbitrary File Upload Vulnerability
exploit/multi/http/tomcat_jsp_upload_bypassTomcat RCE via JSP Upload Bypass
exploit/multi/http/tomcat_mgr_deployApache Tomcat Manager Application Deployer Authenticated Code Execution
exploit/multi/http/tomcat_mgr_uploadApache Tomcat Manager Authenticated Upload Code Execution
exploit/multi/http/totaljs_cms_widget_execTotal.js CMS 12 Widget JavaScript Code Injection
exploit/multi/http/traq_plugin_execTraq admincp/common.php Remote Code Execution
exploit/multi/http/trendmicro_threat_discovery_admin_sys_time_cmdiTrend Micro Threat Discovery Appliance admin_sys_time.cgi Remote Command Execution
exploit/multi/http/ubiquiti_unifi_log4shellUniFi Network Application Unauthenticated JNDI Injection RCE (via Log4Shell)
exploit/multi/http/uptime_file_upload_1Idera Up.Time Monitoring Station 7.0 post2file.php Arbitrary File Upload
exploit/multi/http/uptime_file_upload_2Idera Up.Time Monitoring Station 7.4 post2file.php Arbitrary File Upload
exploit/multi/http/v0pcr3w_execv0pCr3w Web Shell Remote Code Execution
exploit/multi/http/vbseo_proc_deutfvBSEO proc_deutf() Remote PHP Code Injection
exploit/multi/http/vbulletin_getindexablecontentvBulletin /ajax/api/content_infraction/getIndexableContent nodeid Parameter SQL Injection
exploit/multi/http/vbulletin_unserializevBulletin 5.1.2 Unserialize Code Execution
exploit/multi/http/vbulletin_widgetconfig_rcevBulletin widgetConfig RCE
exploit/multi/http/vbulletin_widget_template_rcevBulletin 5.x /ajax/render/widget_tabbedcontainer_tab_panel PHP remote code execution.
exploit/multi/http/visual_mining_netcharts_uploadVisual Mining NetCharts Server Remote Code Execution
exploit/multi/http/vmware_vcenter_log4shellVMware vCenter Server Unauthenticated JNDI Injection RCE (via Log4Shell)
exploit/multi/http/vmware_vcenter_uploadova_rceVMware vCenter Server Unauthenticated OVA File Upload RCE
exploit/multi/http/vtiger_install_rceVtiger Install Unauthenticated Remote Command Execution
exploit/multi/http/vtiger_logo_upload_execVtiger CRM - Authenticated Logo Upload RCE
exploit/multi/http/vtiger_php_execvTigerCRM v5.4.0/v5.3.0 Authenticated Remote Code Execution
exploit/multi/http/vtiger_soap_uploadvTiger CRM SOAP AddEmailAttachment Arbitrary File Upload
exploit/multi/http/weblogic_admin_handle_rceOracle WebLogic Server Administration Console Handle RCE
exploit/multi/http/webnms_file_uploadWebNMS Framework Server Arbitrary File Upload
exploit/multi/http/webpagetest_upload_execWebPageTest Arbitrary PHP File Upload
exploit/multi/http/werkzeug_debug_rceWerkzeug Debug Shell Command Execution
exploit/multi/http/wikka_spam_execWikkaWiki 1.3.2 Spam Logging PHP Injection
exploit/multi/http/wp_ait_csv_rceWordPress AIT CSV Import Export Unauthenticated Remote Code Execution
exploit/multi/http/wp_catch_themes_demo_importWordpress Plugin Catch Themes Demo Import RCE
exploit/multi/http/wp_crop_rceWordPress Crop-image Shell Upload
exploit/multi/http/wp_db_backup_rceWP Database Backup RCE
exploit/multi/http/wp_dnd_mul_file_rceWordpress Drag and Drop Multi File Uploader RCE
exploit/multi/http/wp_file_manager_rceWordPress File Manager Unauthenticated Remote Code Execution
exploit/multi/http/wp_ninja_forms_unauthenticated_file_uploadWordPress Ninja Forms Unauthenticated File Upload
exploit/multi/http/wp_plugin_backup_guard_rceWordpress Plugin Backup Guard - Authenticated Remote Code Execution
exploit/multi/http/wp_plugin_elementor_auth_upload_rceWordpress Plugin Elementor Authenticated Upload Remote Code Execution
exploit/multi/http/wp_plugin_modern_events_calendar_rceWordpress Plugin Modern Events Calendar - Authenticated Remote Code Execution
exploit/multi/http/wp_plugin_sp_project_document_rceWordpress Plugin SP Project and Document - Authenticated Remote Code Execution
exploit/multi/http/wp_popular_posts_rceWordpress Popular Posts Authenticated RCE
exploit/multi/http/wp_responsive_thumbnail_slider_uploadWordPress Responsive Thumbnail Slider Arbitrary File Upload
exploit/multi/http/wp_simple_file_list_rceWordPress Simple File List Unauthenticated Remote Code Execution
exploit/multi/http/wso2_file_upload_rceWSO2 Arbitrary File Upload to RCE
exploit/multi/http/x7chat2_php_execX7 Chat 2.0.5 lib/message.php preg_replace() PHP Code Execution
exploit/multi/http/zabbix_script_execZabbix Authenticated Remote Command Execution
exploit/multi/http/zemra_panel_rceZemra Botnet CnC Web Panel Remote Code Execution
exploit/multi/http/zenworks_configuration_management_uploadNovell ZENworks Configuration Management Arbitrary File Upload
exploit/multi/http/zenworks_control_center_uploadNovell ZENworks Configuration Management Remote Execution
exploit/multi/http/zpanel_information_disclosure_rceZpanel Remote Unauthenticated RCE
exploit/multi/ids/snort_dce_rpcSnort 2 DCE/RPC Preprocessor Buffer Overflow
exploit/multi/kubernetes/execKubernetes authenticated code execution
exploit/multi/local/allwinner_backdoorAllwinner 3.4 Legacy Kernel Local Privilege Escalation
exploit/multi/local/magnicomp_sysinfo_mcsiwrapper_priv_escMagniComp SysInfo mcsiwrapper Privilege Escalation
exploit/multi/local/vagrant_synced_folder_vagrantfile_breakoutVagrant Synced Folder Vagrantfile Breakout
exploit/multi/local/xorg_x11_suid_serverXorg X11 Server SUID logfile Privilege Escalation
exploit/multi/local/xorg_x11_suid_server_modulepathXorg X11 Server SUID modulepath Privilege Escalation
exploit/multi/misc/arkeia_agent_execWestern Digital Arkeia Remote Code Execution
exploit/multi/misc/batik_svg_javaSquiggle 1.7 SVG Browser Java Code Execution
exploit/multi/misc/bmc_patrol_cmd_execBMC Patrol Agent Privilege Escalation Cmd Execution
exploit/multi/misc/bmc_server_automation_rscd_nsh_rceBMC Server Automation RSCD Agent NSH Remote Command Execution
exploit/multi/misc/claymore_dual_miner_remote_manager_rceNanopool Claymore Dual Miner APIs RCE
exploit/multi/misc/consul_rexec_execHashicorp Consul Remote Command Execution via Rexec
exploit/multi/misc/consul_service_execHashicorp Consul Remote Command Execution via Services API
exploit/multi/misc/erlang_cookie_rceErlang Port Mapper Daemon Cookie RCE
exploit/multi/misc/freeswitch_event_socket_cmd_execFreeSWITCH Event Socket Command Execution
exploit/multi/misc/hp_data_protector_exec_integutilHP Data Protector EXEC_INTEGUTIL Remote Code Execution
exploit/multi/misc/hp_vsa_execHP StorageWorks P4000 Virtual SAN Appliance Command Execution
exploit/multi/misc/ibm_tm1_unauth_rceIBM TM1 / Planning Analytics Unauthenticated Remote Code Execution
exploit/multi/misc/indesign_server_soapAdobe IndesignServer 5.5 SOAP Server Arbitrary Script Execution
exploit/multi/misc/java_jdwp_debuggerJava Debug Wire Protocol Remote Code Execution
exploit/multi/misc/java_jmx_serverJava JMX Server Insecure Configuration Java Code Execution
exploit/multi/misc/java_rmi_serverJava RMI Server Insecure Default Configuration Java Code Execution
exploit/multi/misc/jboss_remoting_unified_invoker_rceJBOSS EAP/AS Remoting Unified Invoker RCE
exploit/multi/misc/legend_bot_execLegend Perl IRC Bot Remote Code Execution
exploit/multi/misc/msfd_rce_remoteMetasploit msfd Remote Code Execution
exploit/multi/misc/msf_rpc_consoleMetasploit RPC Console Command Execution
exploit/multi/misc/nodejs_v8_debuggerNodeJS Debugger Command Injection
exploit/multi/misc/nomad_execHashiCorp Nomad Remote Command Execution
exploit/multi/misc/openoffice_document_macroApache OpenOffice Text Document Malicious Macro Execution
exploit/multi/misc/openview_omniback_execHP OpenView OmniBack II Command Execution
exploit/multi/misc/osgi_console_execEclipse Equinox OSGi Console Command Execution
exploit/multi/misc/pbot_execPHP IRC Bot pbot eval() Remote Code Execution
exploit/multi/misc/persistent_hpca_radexec_execHP Client Automation Command Injection
exploit/multi/misc/qemu_monitor_hmp_migrate_cmd_execQEMU Monitor HMP 'migrate' Command Execution
exploit/multi/misc/ra1nx_pubcall_execRa1NX PHP Bot PubCall Authentication Bypass Remote Code Execution
exploit/multi/misc/teamcity_agent_xmlrpc_execTeamCity Agent XML-RPC Command Execution
exploit/multi/misc/veritas_netbackup_cmdexecVERITAS NetBackup Remote Command Execution
exploit/multi/misc/w3tw0rk_execw3tw0rk / Pitbul IRC Bot Remote Code Execution
exploit/multi/misc/weblogic_deserialize_asyncresponseserviceOracle Weblogic Server Deserialization RCE - AsyncResponseService
exploit/multi/misc/weblogic_deserialize_badattr_extcompWebLogic Server Deserialization RCE BadAttributeValueExpException ExtComp
exploit/multi/misc/weblogic_deserialize_badattrvalWebLogic Server Deserialization RCE - BadAttributeValueExpException
exploit/multi/misc/weblogic_deserializeOracle Weblogic Server Deserialization RCE
exploit/multi/misc/weblogic_deserialize_marshalledobjectOracle Weblogic Server Deserialization RCE - MarshalledObject
exploit/multi/misc/weblogic_deserialize_rawobjectOracle Weblogic Server Deserialization RCE - Raw Object
exploit/multi/misc/weblogic_deserialize_unicastrefOracle Weblogic Server Deserialization RCE - RMI UnicastRef
exploit/multi/misc/wireshark_lwres_getaddrbynameWireshark LWRES Dissector getaddrsbyname_request Buffer Overflow
exploit/multi/misc/wireshark_lwres_getaddrbyname_loopWireshark LWRES Dissector getaddrsbyname_request Buffer Overflow (loop)
exploit/multi/misc/xdh_x_execXdh / LinuxNet Perlbot / fBot IRC Bot Remote Code Execution
exploit/multi/misc/zend_java_bridgeZend Server Java Bridge Arbitrary Java Code Execution
exploit/multi/mysql/mysql_udf_payloadOracle MySQL UDF Payload Execution
exploit/multi/ntp/ntp_overflowNTP Daemon readvar Buffer Overflow
exploit/multi/php/ignition_laravel_debug_rceUnauthenticated remote code execution in Ignition
exploit/multi/php/php_unserialize_zval_cookiePHP 4 unserialize() ZVAL Reference Counter Overflow (Cookie)
exploit/multi/php/wp_duplicator_code_injectSnap Creek Duplicator WordPress plugin code injection
exploit/multi/postgres/postgres_copy_from_program_cmd_execPostgreSQL COPY FROM PROGRAM Command Execution
exploit/multi/postgres/postgres_createlangPostgreSQL CREATE LANGUAGE Execution
exploit/multi/realserver/describeRealServer Describe Buffer Overflow
exploit/multi/samba/nttransSamba 2.2.2 - 2.2.6 nttrans Buffer Overflow
exploit/multi/samba/usermap_scriptSamba "username map script" Command Execution
exploit/multi/sap/cve_2020_6207_solman_rsSAP Solution Manager remote unauthorized OS commands execution
exploit/multi/sap/sap_mgmt_con_osexec_payloadSAP Management Console OSExecute Payload Execution
exploit/multi/sap/sap_soap_rfc_sxpg_call_system_execSAP SOAP RFC SXPG_CALL_SYSTEM Remote Command Execution
exploit/multi/sap/sap_soap_rfc_sxpg_command_execSAP SOAP RFC SXPG_COMMAND_EXECUTE Remote Command Execution
exploit/multi/scada/inductive_ignition_rceInductive Automation Ignition Remote Code Execution
exploit/multi/script/web_deliveryScript Web Delivery
exploit/multi/ssh/sshexecSSH User Code Execution
exploit/multi/svn/svnserve_dateSubversion Date Svnserve
exploit/multi/upnp/libupnp_ssdp_overflowPortable UPnP SDK unique_service_name() Remote Code Execution
exploit/multi/veritas/beagent_sha_auth_rceVeritas Backup Exec Agent Remote Code Execution
exploit/multi/vnc/vnc_keyboard_execVNC Keyboard Remote Code Execution
exploit/multi/vpn/tincd_bofTincd Post-Authentication Remote TCP Stack Buffer Overflow
exploit/multi/wyse/hagent_untrusted_hsdataWyse Rapport Hagent Fake Hserver Command Execution
exploit/netware/smb/lsass_cifsNovell NetWare LSASS CIFS.NLM Driver Stack Buffer Overflow
exploit/netware/sunrpc/pkernel_callitNetWare 6.5 SunRPC Portmapper CALLIT Stack Buffer Overflow
exploit/openbsd/local/dynamic_loader_chpass_privescOpenBSD Dynamic Loader chpass Privilege Escalation
exploit/osx/afp/loginextAppleFileServer LoginExt PathName Overflow
exploit/osx/arkeia/type77Arkeia Backup Client Type 77 Overflow (Mac OS X)
exploit/osx/browser/adobe_flash_delete_range_tl_opAdobe Flash Player DeleteRangeTimelineOperation Type-Confusion
exploit/osx/browser/mozilla_mchannelMozilla Firefox 3.6.16 mChannel Use-After-Free
exploit/osx/browser/osx_gatekeeper_bypassmacOS Gatekeeper check bypass
exploit/osx/browser/safari_file_policyApple Safari file:// Arbitrary Code Execution
exploit/osx/browser/safari_in_operator_side_effectSafari in Operator Side Effect Exploit
exploit/osx/browser/safari_metadata_archiveSafari Archive Metadata Command Execution
exploit/osx/browser/safari_proxy_object_type_confusionSafari Proxy Object Type Confusion
exploit/osx/browser/safari_user_assisted_applescript_execSafari User-Assisted Applescript Exec Attack
exploit/osx/browser/safari_user_assisted_download_launchSafari User-Assisted Download and Run Attack
exploit/osx/browser/software_updateApple OS X Software Update Command Execution
exploit/osx/email/mailapp_image_execMail.app Image Attachment Command Execution
exploit/osx/ftp/webstar_ftp_userWebSTAR FTP Server USER Overflow
exploit/osx/http/evocam_webserverMacOS X EvoCam HTTP GET Buffer Overflow
exploit/osx/local/cfprefsd_race_conditionmacOS cfprefsd Arbitrary File Write Local Privilege Escalation
exploit/osx/local/dyld_print_to_file_rootApple OS X DYLD_PRINT_TO_FILE Privilege Escalation
exploit/osx/local/feedback_assistant_rootMac OS X Feedback Assistant Race Condition
exploit/osx/local/iokit_keyboard_rootMac OS X IOKit Keyboard Driver Root Privilege Escalation
exploit/osx/local/libxpc_mitm_ssudoMac OS X libxpc MITM Privilege Escalation
exploit/osx/local/nfs_mount_rootMac OS X NFS Mount Privilege Escalation Exploit
exploit/osx/local/persistenceMac OS X Persistent Payload Installer
exploit/osx/local/root_no_passwordMac OS X Root Privilege Escalation
exploit/osx/local/rootpipe_entitlementsApple OS X Entitlements Rootpipe Privilege Escalation
exploit/osx/local/rootpipeApple OS X Rootpipe Privilege Escalation
exploit/osx/local/rsh_libmallocMac OS X 10.9.5 / 10.10.5 - rsh/libmalloc Privilege Escalation
exploit/osx/local/setuid_tunnelblickSetuid Tunnelblick Privilege Escalation
exploit/osx/local/setuid_viscosityViscosity setuid-set ViscosityHelper Privilege Escalation
exploit/osx/local/sudo_password_bypassMac OS X Sudo Password Bypass
exploit/osx/local/timemachine_cmd_injectionMac OS X TimeMachine (tmdiagnose) Command Injection Privilege Escalation
exploit/osx/local/tpwnMac OS X "tpwn" Privilege Escalation
exploit/osx/local/vmware_bash_function_rootOS X VMWare Fusion Privilege Escalation via Bash Environment Code Injection (Shellshock)
exploit/osx/local/vmware_fusion_lpeVMware Fusion USB Arbitrator Setuid Privilege Escalation
exploit/osx/mdns/upnp_locationMac OS X mDNSResponder UPnP Location Overflow
exploit/osx/misc/ufo_aiUFO: Alien Invasion IRC Client Buffer Overflow
exploit/osx/rtsp/quicktime_rtsp_content_typeMacOS X QuickTime RTSP Content-Type Overflow
exploit/osx/samba/lsa_transnames_heapSamba lsa_io_trans_names Heap Overflow
exploit/osx/samba/trans2openSamba trans2open Overflow (Mac OS X PPC)
exploit/qnx/local/ifwatchd_priv_escifwatchd Privilege Escalation
exploit/qnx/qconn/qconn_execQNX qconn Command Execution
exploit/solaris/dtspcd/heap_noirSolaris dtspcd Heap Overflow
exploit/solaris/local/extremeparr_dtappgather_priv_escSolaris 'EXTREMEPARR' dtappgather Privilege Escalation
exploit/solaris/local/libnspr_nspr_log_file_priv_escSolaris libnspr NSPR_LOG_FILE Privilege Escalation
exploit/solaris/local/rsh_stack_clash_priv_escSolaris RSH Stack Clash Privilege Escalation
exploit/solaris/local/xscreensaver_log_priv_escSolaris xscreensaver log Privilege Escalation
exploit/solaris/lpd/sendmail_execSolaris LPD Command Execution
exploit/solaris/samba/lsa_transnames_heapSamba lsa_io_trans_names Heap Overflow
exploit/solaris/samba/trans2openSamba trans2open Overflow (Solaris SPARC)
exploit/solaris/ssh/pam_username_bofOracle Solaris SunSSH PAM parse_user_name() Buffer Overflow
exploit/solaris/sunrpc/sadmind_adm_build_pathSun Solaris sadmind adm_build_path() Buffer Overflow
exploit/solaris/sunrpc/sadmind_execSolaris sadmind Command Execution
exploit/solaris/sunrpc/ypupdated_execSolaris ypupdated Command Execution
exploit/solaris/telnet/fuserSun Solaris Telnet Remote Authentication Bypass Vulnerability
exploit/solaris/telnet/ttypromptSolaris in.telnetd TTYPROMPT Buffer Overflow
exploit/unix/dhcp/bash_environmentDhclient Bash Environment Variable Injection (Shellshock)
exploit/unix/dhcp/rhel_dhcp_client_command_injectionDHCP Client Command Injection (DynoRoot)
exploit/unix/fileformat/exiftool_djvu_ant_perl_injectionExifTool DjVu ANT Perl injection
exploit/unix/fileformat/ghostscript_type_confusionGhostscript Type Confusion Arbitrary Command Execution
exploit/unix/fileformat/imagemagick_delegateImageMagick Delegate Arbitrary Command Execution
exploit/unix/fileformat/metasploit_libnotify_cmd_injectionMetasploit Libnotify Plugin Arbitrary Command Execution
exploit/unix/fileformat/metasploit_msfvenom_apk_template_cmd_injectionRapid7 Metasploit Framework msfvenom APK Template Command Injection
exploit/unix/ftp/proftpd_133c_backdoorProFTPD-1.3.3c Backdoor Command Execution
exploit/unix/ftp/proftpd_modcopy_execProFTPD 1.3.5 Mod_Copy Command Execution
exploit/unix/ftp/vsftpd_234_backdoorVSFTPD v2.3.4 Backdoor Command Execution
exploit/unix/http/cacti_filter_sqli_rceCacti color filter authenticated SQLi to RCE
exploit/unix/http/contentkeeperweb_mimencodeContentKeeper Web Remote Command Execution
exploit/unix/http/ctek_skyrouterCTEK SkyRouter 4200 and 4300 Command Execution
exploit/unix/http/dell_kace_k1000_uploadDell KACE K1000 File Upload
exploit/unix/http/epmp1000_get_chart_cmd_shellCambium ePMP1000 'get_chart' Shell via Command Injection (v3.1-3.5-RC7)
exploit/unix/http/epmp1000_ping_cmd_shellCambium ePMP1000 'ping' Shell via Command Injection (up to v2.5)
exploit/unix/http/freepbx_callmenumFreePBX 2.10.0 / 2.9.0 callmenum Remote Code Execution
exploit/unix/http/laravel_token_unserialize_execPHP Laravel Framework token Unserialize Remote Command Execution
exploit/unix/http/lifesize_roomLifeSize Room Command Injection
exploit/unix/http/pfsense_clickjackingClickjacking Vulnerability In CSRF Error Page pfSense
exploit/unix/http/pfsense_diag_routes_webshellpfSense Diag Routes Web Shell Upload
exploit/unix/http/pfsense_graph_injection_execpfSense authenticated graph status RCE
exploit/unix/http/pfsense_group_member_execpfSense authenticated group member RCE
exploit/unix/http/pfsense_pfblockerng_webshellpfSense plugin pfBlockerNG unauthenticated RCE as root
exploit/unix/http/pihole_blocklist_execPi-Hole heisenbergCompensator Blocklist OS Command Execution
exploit/unix/http/pihole_dhcp_mac_execPi-Hole DHCP MAC OS Command Execution
exploit/unix/http/pihole_whitelist_execPi-Hole Whitelist OS Command Execution
exploit/unix/http/quest_kace_systems_management_rceQuest KACE Systems Management Command Injection
exploit/unix/http/schneider_electric_net55xx_encoderSchneider Electric Pelco Endura NET55XX Encoder
exploit/unix/http/tnftp_savefiletnftp "savefile" Arbitrary Command Execution
exploit/unix/http/twiki_debug_pluginsTWiki Debugenableplugins Remote Code Execution
exploit/unix/http/vmturbo_vmtadmin_exec_noauthVMTurbo Operations Manager vmtadmin.cgi Remote Command Execution
exploit/unix/http/xdebug_unauth_execxdebug Unauthenticated OS Command Execution
exploit/unix/http/zivif_ipcheck_execZivif Camera iptest.cgi Blind Remote Command Execution
exploit/unix/irc/unreal_ircd_3281_backdoorUnrealIRCD 3.2.8.1 Backdoor Command Execution
exploit/unix/local/at_persistenceat(1) Persistence
exploit/unix/local/chkrootkitChkrootkit Local Privilege Escalation
exploit/unix/local/emacs_movemailEmacs movemail Privilege Escalation
exploit/unix/local/exim_perl_startupExim "perl_startup" Privilege Escalation
exploit/unix/local/netbsd_mail_localNetBSD mail.local Privilege Escalation
exploit/unix/local/opensmtpd_oob_read_lpeOpenSMTPD OOB Read Local Privilege Escalation
exploit/unix/local/setuid_nmapSetuid Nmap Exploit
exploit/unix/misc/distcc_execDistCC Daemon Command Execution
exploit/unix/misc/polycom_hdx_auth_bypassPolycom Command Shell Authorization Bypass
exploit/unix/misc/polycom_hdx_traceroute_execPolycom Shell HDX Series Traceroute Command Execution
exploit/unix/misc/spamassassin_execSpamAssassin spamd Remote Command Execution
exploit/unix/misc/xerox_mfpXerox Multifunction Printers (MFP) "Patch" DLM Vulnerability
exploit/unix/misc/zabbix_agent_execZabbix Agent net.tcp.listen Command Injection
exploit/unix/smtp/clamav_milter_blackholeClamAV Milter Blackhole-Mode Remote Code Execution
exploit/unix/smtp/exim4_string_formatExim4 string_format Function Heap Buffer Overflow
exploit/unix/smtp/morris_sendmail_debugMorris Worm sendmail Debug Mode Shell Escape
exploit/unix/smtp/opensmtpd_mail_from_rceOpenSMTPD MAIL FROM Remote Code Execution
exploit/unix/smtp/qmail_bash_env_execQmail SMTP Bash Environment Variable Injection (Shellshock)
exploit/unix/sonicwall/sonicwall_xmlrpc_rceSonicWall Global Management System XMLRPC set_time_zone Unauth RCE
exploit/unix/ssh/arista_tacplus_shellArista restricted shell escape (with privesc)
exploit/unix/ssh/array_vxag_vapv_privkey_privescArray Networks vAPV and vxAG Private Key Privilege Escalation Code Execution
exploit/unix/ssh/tectia_passwd_changereqTectia SSH USERAUTH Change Request Password Reset Vulnerability
exploit/unix/webapp/actualanalyzer_ant_cookie_execActualAnalyzer 'ant' Cookie Command Execution
exploit/unix/webapp/aerohive_netconfig_lfi_log_poison_rceAerohive NetConfig 10.0r8a LFI and log poisoning to RCE
exploit/unix/webapp/ajenti_auth_username_cmd_injectionAjenti auth username Command Injection
exploit/unix/webapp/arkeia_upload_execWestern Digital Arkeia Remote Code Execution
exploit/unix/webapp/awstats_configdir_execAWStats configdir Remote Command Execution
exploit/unix/webapp/awstats_migrate_execAWStats migrate Remote Command Execution
exploit/unix/webapp/awstatstotals_multisortAWStats Totals multisort Remote Command Execution
exploit/unix/webapp/barracuda_img_execBarracuda IMG.PL Remote Command Execution
exploit/unix/webapp/base_qry_commonBASE base_qry_common Remote File Include
exploit/unix/webapp/basilic_diff_execBasilic 1.5.14 diff.php Arbitrary Command Execution
exploit/unix/webapp/bolt_authenticated_rceBolt CMS 3.7.0 - Authenticated Remote Code Execution
exploit/unix/webapp/cacti_graphimage_execCacti graph_view.php Remote Command Execution
exploit/unix/webapp/cakephp_cache_corruptionCakePHP Cache Corruption Code Execution
exploit/unix/webapp/carberp_backdoor_execCarberp Web Panel C2 Backdoor Remote PHP Code Execution
exploit/unix/webapp/citrix_access_gateway_execCitrix Access Gateway Command Execution
exploit/unix/webapp/clipbucket_upload_execClipBucket Remote Code Execution
exploit/unix/webapp/coppermine_piceditorCoppermine Photo Gallery picEditor.php Command Execution
exploit/unix/webapp/datalife_preview_execDataLife Engine preview.php PHP Code Injection
exploit/unix/webapp/dogfood_spell_execDogfood CRM spell.php Remote Command Execution
exploit/unix/webapp/drupal_coder_execDrupal CODER Module Remote Command Execution
exploit/unix/webapp/drupal_drupalgeddon2Drupal Drupalgeddon 2 Forms API Property Injection
exploit/unix/webapp/drupal_restws_execDrupal RESTWS Module Remote PHP Code Execution
exploit/unix/webapp/drupal_restws_unserializeDrupal RESTful Web Services unserialize() RCE
exploit/unix/webapp/egallery_upload_execEGallery PHP File Upload Vulnerability
exploit/unix/webapp/elfinder_php_connector_exiftran_cmd_injectionelFinder PHP Connector exiftran Command Injection
exploit/unix/webapp/flashchat_upload_execFlashChat Arbitrary File Upload
exploit/unix/webapp/foswiki_maketextFoswiki MAKETEXT Remote Command Execution
exploit/unix/webapp/freepbx_config_execFreePBX config.php Remote Code Execution
exploit/unix/webapp/fusionpbx_exec_cmd_execFusionPBX Command exec.php Command Execution
exploit/unix/webapp/fusionpbx_operator_panel_exec_cmd_execFusionPBX Operator Panel exec.php Command Execution
exploit/unix/webapp/generic_execGeneric Web Application Unix Command Execution
exploit/unix/webapp/get_simple_cms_upload_execGetSimpleCMS PHP File Upload Vulnerability
exploit/unix/webapp/google_proxystylesheet_execGoogle Appliance ProxyStyleSheet Command Execution
exploit/unix/webapp/graphite_pickle_execGraphite Web Unsafe Pickle Handling
exploit/unix/webapp/guestbook_ssi_execMatt Wright guestbook.pl Arbitrary Command Execution
exploit/unix/webapp/hastymail_execHastymail 2.1.1 RC1 Command Injection
exploit/unix/webapp/havalite_upload_execHavalite CMS Arbitary File Upload Vulnerability
exploit/unix/webapp/horde_unserialize_execHorde Framework Unserialize PHP Code Execution
exploit/unix/webapp/hybridauth_install_php_execHybridAuth install.php PHP Code Execution
exploit/unix/webapp/instantcms_execInstantCMS 1.6 Remote PHP Code Execution
exploit/unix/webapp/invision_pboard_unserialize_execInvision IP.Board unserialize() PHP Code Execution
exploit/unix/webapp/joomla_akeeba_unserializeJoomla Akeeba Kickstart Unserialize Remote Code Execution
exploit/unix/webapp/joomla_comfields_sqli_rceJoomla Component Fields SQLi Remote Code Execution
exploit/unix/webapp/joomla_comjce_imgmanagerJoomla Component JCE File Upload Remote Code Execution
exploit/unix/webapp/joomla_contenthistory_sqli_rceJoomla Content History SQLi Remote Code Execution
exploit/unix/webapp/joomla_media_upload_execJoomla Media Manager File Upload Vulnerability
exploit/unix/webapp/joomla_tinybrowserJoomla 1.5.12 TinyBrowser File Upload Code Execution
exploit/unix/webapp/jquery_file_uploadblueimp's jQuery (Arbitrary) File Upload
exploit/unix/webapp/kimai_sqliKimai v0.9.2 'db_restore.php' SQL Injection
exploit/unix/webapp/libretto_upload_execLibrettoCMS File Manager Arbitary File Upload Vulnerability
exploit/unix/webapp/maarch_letterbox_file_uploadMaarch LetterBox Unrestricted File Upload
exploit/unix/webapp/mambo_cache_liteMambo Cache_Lite Class mosConfig_absolute_path Remote File Include
exploit/unix/webapp/mitel_awc_execMitel Audio and Web Conferencing Command Injection
exploit/unix/webapp/moinmoin_twikidrawMoinMoin twikidraw Action Traversal File Upload
exploit/unix/webapp/mybb_backdoormyBB 1.6.4 Backdoor Arbitrary Command Execution
exploit/unix/webapp/nagios3_history_cgiNagios3 history.cgi Host Command Execution
exploit/unix/webapp/nagios3_statuswml_pingNagios3 statuswml.cgi Ping Command Execution
exploit/unix/webapp/nagios_graph_explorerNagios XI Network Monitor Graph Explorer Component Command Injection
exploit/unix/webapp/narcissus_backend_execNarcissus Image Configuration Passthru Vulnerability
exploit/unix/webapp/openemr_sqli_privesc_uploadOpenEMR 4.1.1 Patch 14 SQLi Privilege Escalation Remote Code Execution
exploit/unix/webapp/openemr_upload_execOpenEMR PHP File Upload Vulnerability
exploit/unix/webapp/open_flash_chart_upload_execOpen Flash Chart v2 Arbitrary File Upload
exploit/unix/webapp/openmediavault_rpc_rceOpenMediaVault rpc.php Authenticated PHP Code Injection
exploit/unix/webapp/opennetadmin_ping_cmd_injectionOpenNetAdmin Ping Command Injection
exploit/unix/webapp/opensis_chain_execopenSIS Unauthenticated PHP Code Execution
exploit/unix/webapp/opensis_modname_execOpenSIS 'modname' PHP Code Execution
exploit/unix/webapp/openview_connectednodes_execHP Openview connectedNodes.ovpl Remote Command Execution
exploit/unix/webapp/openx_banner_editOpenX banner-edit.php File Upload PHP Code Execution
exploit/unix/webapp/oracle_vm_agent_utlOracle VM Server Virtual Server Agent Command Injection
exploit/unix/webapp/oscommerce_filemanagerosCommerce 2.2 Arbitrary PHP Code Execution
exploit/unix/webapp/pajax_remote_execPAJAX Remote Command Execution
exploit/unix/webapp/phpbb_highlightphpBB viewtopic.php Arbitrary Code Execution
exploit/unix/webapp/php_charts_execPHP-Charts v1.0 PHP Code Execution Vulnerability
exploit/unix/webapp/phpcollab_upload_execphpCollab 2.5.1 Unauthenticated File Upload
exploit/unix/webapp/php_evalGeneric PHP Code Evaluation
exploit/unix/webapp/php_includePHP Remote File Include Generic Code Execution
exploit/unix/webapp/phpmyadmin_configPhpMyAdmin Config File Code Injection
exploit/unix/webapp/php_vbulletin_templatevBulletin misc.php Template Name Arbitrary Code Execution
exploit/unix/webapp/php_xmlrpc_evalPHP XML-RPC Arbitrary Code Execution
exploit/unix/webapp/piwik_superuser_plugin_uploadPiwik Superuser Plugin Upload
exploit/unix/webapp/projectpier_upload_execProject Pier Arbitrary File Upload Vulnerability
exploit/unix/webapp/projectsend_upload_execProjectSend Arbitrary File Upload
exploit/unix/webapp/qtss_parse_xml_execQuickTime Streaming Server parse_xml.cgi Remote Execution
exploit/unix/webapp/rconfig_install_cmd_execrConfig install Command Execution
exploit/unix/webapp/redmine_scm_execRedmine SCM Repository Arbitrary Command Execution
exploit/unix/webapp/seportal_sqli_execSePortal SQLi Remote Code Execution
exploit/unix/webapp/simple_e_document_upload_execSimple E-Document Arbitrary File Upload
exploit/unix/webapp/sixapart_movabletype_storable_execSixApart MovableType Storable Perl Code Execution
exploit/unix/webapp/skybluecanvas_execSkyBlueCanvas CMS Remote Code Execution
exploit/unix/webapp/sphpblog_file_uploadSimple PHP Blog Remote Command Execution
exploit/unix/webapp/spip_connect_execSPIP connect Parameter PHP Injection
exploit/unix/webapp/squash_yaml_execSquash YAML Code Execution
exploit/unix/webapp/squirrelmail_pgp_pluginSquirrelMail PGP Plugin Command Execution (SMTP)
exploit/unix/webapp/sugarcrm_rest_unserialize_execSugarCRM REST Unserialize PHP Code Execution
exploit/unix/webapp/sugarcrm_unserialize_execSugarCRM unserialize() PHP Code Execution
exploit/unix/webapp/thinkphp_rceThinkPHP Multiple PHP Injection RCEs
exploit/unix/webapp/tikiwiki_graph_formula_execTikiWiki tiki-graph_formula Remote PHP Code Execution
exploit/unix/webapp/tikiwiki_jhot_execTikiWiki jhot Remote Command Execution
exploit/unix/webapp/tikiwiki_unserialize_execTiki Wiki unserialize() PHP Code Execution
exploit/unix/webapp/tikiwiki_upload_execTiki Wiki Unauthenticated File Upload Vulnerability
exploit/unix/webapp/trixbox_ce_endpoint_devicemap_rceTrixBox CE endpoint_devicemap.php Authenticated Command Execution
exploit/unix/webapp/trixbox_langchoiceTrixbox langChoice PHP Local File Inclusion
exploit/unix/webapp/tuleap_rest_unserialize_execTuleap 9.6 Second-Order PHP Object Injection
exploit/unix/webapp/tuleap_unserialize_execTuleap PHP Unserialize Code Execution
exploit/unix/webapp/twiki_historyTWiki History TWikiUsers rev Parameter Command Execution
exploit/unix/webapp/twiki_maketextTWiki MAKETEXT Remote Command Execution
exploit/unix/webapp/twiki_searchTWiki Search Function Arbitrary Command Execution
exploit/unix/webapp/vbulletin_vote_sqli_execvBulletin index.php/ajax/api/reputation/vote nodeid Parameter SQL Injection
exploit/unix/webapp/vicidial_manager_send_cmd_execVICIdial Manager Send OS Command Injection
exploit/unix/webapp/vicidial_user_authorization_unauth_cmd_execVICIdial user_authorization Unauthenticated Command Execution
exploit/unix/webapp/webmin_show_cgi_execWebmin /file/show.cgi Remote Command Execution
exploit/unix/webapp/webmin_upload_execWebmin Upload Authenticated RCE
exploit/unix/webapp/webtester_execWebTester 5.x Command Execution
exploit/unix/webapp/wp_admin_shell_uploadWordPress Admin Shell Upload
exploit/unix/webapp/wp_advanced_custom_fields_execWordPress Plugin Advanced Custom Fields Remote File Inclusion
exploit/unix/webapp/wp_ajax_load_more_file_uploadWordpress Ajax Load More PHP Upload Vulnerability
exploit/unix/webapp/wp_asset_manager_upload_execWordPress Asset-Manager PHP File Upload Vulnerability
exploit/unix/webapp/wp_creativecontactform_file_uploadWordpress Creative Contact Form Upload Vulnerability
exploit/unix/webapp/wp_downloadmanager_uploadWordpress Download Manager (download-manager) Unauthenticated File Upload
exploit/unix/webapp/wp_easycart_unrestricted_file_uploadWordPress WP EasyCart Unrestricted File Upload
exploit/unix/webapp/wp_foxypress_uploadWordPress Plugin Foxypress uploadify.php Arbitrary Code Execution
exploit/unix/webapp/wp_frontend_editor_file_uploadWordpress Front-end Editor File Upload
exploit/unix/webapp/wp_google_document_embedder_execWordPress Plugin Google Document Embedder Arbitrary File Disclosure
exploit/unix/webapp/wp_holding_pattern_file_uploadWordPress Holding Pattern Theme Arbitrary File Upload
exploit/unix/webapp/wp_inboundio_marketing_file_uploadWordpress InBoundio Marketing PHP Upload Vulnerability
exploit/unix/webapp/wp_infinitewp_auth_bypassWordPress InfiniteWP Client Authentication Bypass
exploit/unix/webapp/wp_infusionsoft_uploadWordpress InfusionSoft Upload Vulnerability
exploit/unix/webapp/wp_lastpost_execWordPress cache_lastpostdate Arbitrary Code Execution
exploit/unix/webapp/wp_mobile_detector_upload_executeWordPress WP Mobile Detector 3.5 Shell Upload
exploit/unix/webapp/wp_nmediawebsite_file_uploadWordpress N-Media Website Contact Form Upload Vulnerability
exploit/unix/webapp/wp_optimizepress_uploadWordPress OptimizePress Theme File Upload Vulnerability
exploit/unix/webapp/wp_photo_gallery_unrestricted_file_uploadWordPress Photo Gallery Unrestricted File Upload
exploit/unix/webapp/wp_phpmailer_host_headerWordPress PHPMailer Host Header Command Injection
exploit/unix/webapp/wp_pie_register_bypass_rceWordPress Plugin Pie Register Auth Bypass to RCE
exploit/unix/webapp/wp_pixabay_images_uploadWordPress Pixabay Images PHP Code Upload
exploit/unix/webapp/wp_plainview_activity_monitor_rceWordpress Plainview Activity Monitor RCE
exploit/unix/webapp/wp_platform_execWordPress Platform Theme File Upload Vulnerability
exploit/unix/webapp/wp_property_upload_execWordPress WP-Property PHP File Upload Vulnerability
exploit/unix/webapp/wp_reflexgallery_file_uploadWordpress Reflex Gallery Upload Vulnerability
exploit/unix/webapp/wp_revslider_upload_executeWordPress RevSlider File Upload and Execute Vulnerability
exploit/unix/webapp/wp_slideshowgallery_uploadWordpress SlideShow Gallery Authenticated File Upload
exploit/unix/webapp/wp_symposium_shell_uploadWordPress WP Symposium 14.11 Shell Upload
exploit/unix/webapp/wp_total_cache_execWordPress W3 Total Cache PHP Code Execution
exploit/unix/webapp/wp_worktheflow_uploadWordpress Work The Flow Upload Vulnerability
exploit/unix/webapp/wp_wpdiscuz_unauthenticated_file_uploadWordPress wpDiscuz Unauthenticated File Upload Vulnerability
exploit/unix/webapp/wp_wpshop_ecommerce_file_uploadWordPress WPshop eCommerce Arbitrary File Upload Vulnerability
exploit/unix/webapp/wp_wptouch_file_uploadWordPress WPTouch Authenticated File Upload
exploit/unix/webapp/wp_wysija_newsletters_uploadWordpress MailPoet Newsletters (wysija-newsletters) Unauthenticated File Upload
exploit/unix/webapp/xoda_file_uploadXODA 0.4.5 Arbitrary PHP File Upload Vulnerability
exploit/unix/webapp/xymon_useradm_cmd_execXymon useradm Command Execution
exploit/unix/webapp/zeroshell_execZeroShell Remote Code Execution
exploit/unix/webapp/zimbra_lfiZimbra Collaboration Server LFI
exploit/unix/webapp/zoneminder_lang_execZoneMinder Language Settings Remote Code Execution
exploit/unix/webapp/zoneminder_packagecontrol_execZoneMinder Video Server packageControl Command Execution
exploit/unix/webapp/zpanel_username_execZPanel 10.0.0.2 htpasswd Module Username Command Execution
exploit/unix/x11/x11_keyboard_execX11 Keyboard Command Injection
exploit/windows/antivirus/ams_hndlrsvcSymantec System Center Alert Management System (hndlrsvc.exe) Arbitrary Command Execution
exploit/windows/antivirus/ams_xfrSymantec System Center Alert Management System (xfr.exe) Arbitrary Command Execution
exploit/windows/antivirus/symantec_endpoint_manager_rceSymantec Endpoint Protection Manager /servlet/ConsoleServlet Remote Command Execution
exploit/windows/antivirus/symantec_iaoSymantec Alert Management System Intel Alert Originator Service Buffer Overflow
exploit/windows/antivirus/symantec_rtvscanSymantec Remote Management Buffer Overflow
exploit/windows/antivirus/symantec_workspace_streaming_execSymantec Workspace Streaming ManagementAgentServer.putFile XMLRPC Request Arbitrary File Upload
exploit/windows/antivirus/trendmicro_serverprotect_createbindingTrend Micro ServerProtect 5.58 CreateBinding() Buffer Overflow
exploit/windows/antivirus/trendmicro_serverprotect_earthagentTrend Micro ServerProtect 5.58 EarthAgent.EXE Buffer Overflow
exploit/windows/antivirus/trendmicro_serverprotectTrend Micro ServerProtect 5.58 Buffer Overflow
exploit/windows/arkeia/type77Arkeia Backup Client Type 77 Overflow (Win32)
exploit/windows/backdoor/energizer_duo_payloadEnergizer DUO USB Battery Charger Arucer.dll Trojan Code Execution
exploit/windows/backupexec/name_serviceVeritas Backup Exec Name Service Overflow
exploit/windows/backupexec/remote_agentVeritas Backup Exec Windows Remote Agent Overflow
exploit/windows/backupexec/ssl_uafVeritas/Symantec Backup Exec SSL NDMP Connection Use-After-Free
exploit/windows/brightstor/ca_arcserve_342Computer Associates ARCserve REPORTREMOTEEXECUTECML Buffer Overflow
exploit/windows/brightstor/discovery_tcpCA BrightStor Discovery Service TCP Overflow
exploit/windows/brightstor/discovery_udpCA BrightStor Discovery Service Stack Buffer Overflow
exploit/windows/brightstor/etrust_itm_alertComputer Associates Alert Notification Buffer Overflow
exploit/windows/brightstor/hsmserverCA BrightStor HSM Buffer Overflow
exploit/windows/brightstor/lgserverCA BrightStor ARCserve for Laptops and Desktops LGServer Buffer Overflow
exploit/windows/brightstor/lgserver_multiCA BrightStor ARCserve for Laptops and Desktops LGServer Multiple Commands Buffer Overflow
exploit/windows/brightstor/lgserver_rxrloginCA BrightStor ARCserve for Laptops and Desktops LGServer Buffer Overflow
exploit/windows/brightstor/lgserver_rxssetdatagrowthscheduleandfilterCA BrightStor ARCserve for Laptops and Desktops LGServer rxsSetDataGrowthScheduleAndFilter Buffer Overflow
exploit/windows/brightstor/lgserver_rxsuselicenseiniCA BrightStor ARCserve for Laptops and Desktops LGServer Buffer Overflow
exploit/windows/brightstor/license_gcrCA BrightStor ARCserve License Service GCR NETWORK Buffer Overflow
exploit/windows/brightstor/mediasrv_sunrpcCA BrightStor ArcServe Media Service Stack Buffer Overflow
exploit/windows/brightstor/message_engine_72CA BrightStor ARCserve Message Engine 0x72 Buffer Overflow
exploit/windows/brightstor/message_engine_heapCA BrightStor ARCserve Message Engine Heap Overflow
exploit/windows/brightstor/message_engineCA BrightStor ARCserve Message Engine Buffer Overflow
exploit/windows/brightstor/sql_agentCA BrightStor Agent for Microsoft SQL Overflow
exploit/windows/brightstor/tape_engine_0x8aCA BrightStor ARCserve Tape Engine 0x8A Buffer Overflow
exploit/windows/brightstor/tape_engineCA BrightStor ARCserve Tape Engine Buffer Overflow
exploit/windows/brightstor/universal_agentCA BrightStor Universal Agent Overflow
exploit/windows/browser/adobe_cooltype_singAdobe CoolType SING Table "uniqueName" Stack Buffer Overflow
exploit/windows/browser/adobe_flash_avm2Adobe Flash Player Integer Underflow Remote Code Execution
exploit/windows/browser/adobe_flash_casi32_int_overflowAdobe Flash Player casi32 Integer Overflow
exploit/windows/browser/adobe_flash_copy_pixels_to_byte_arrayAdobe Flash Player copyPixelsToByteArray Method Integer Overflow
exploit/windows/browser/adobe_flash_domain_memory_uafAdobe Flash Player domainMemory ByteArray Use After Free
exploit/windows/browser/adobe_flash_filters_type_confusionAdobe Flash Player Type Confusion Remote Code Execution
exploit/windows/browser/adobe_flash_mp4_cprtAdobe Flash Player MP4 'cprt' Overflow
exploit/windows/browser/adobe_flash_otf_fontAdobe Flash Player 11.3 Kern Table Parsing Integer Overflow
exploit/windows/browser/adobe_flash_pcreAdobe Flash Player PCRE Regex Vulnerability
exploit/windows/browser/adobe_flashplayer_arrayindexingAdobe Flash Player AVM Verification Logic Array Indexing Code Execution
exploit/windows/browser/adobe_flashplayer_avmAdobe Flash Player AVM Bytecode Verification Vulnerability
exploit/windows/browser/adobe_flashplayer_flash10oAdobe Flash Player 10.2.153.1 SWF Memory Corruption Vulnerability
exploit/windows/browser/adobe_flashplayer_newfunctionAdobe Flash Player "newfunction" Invalid Pointer Use
exploit/windows/browser/adobe_flash_regex_valueAdobe Flash Player Regular Expression Heap Overflow
exploit/windows/browser/adobe_flash_rtmpAdobe Flash Player Object Type Confusion
exploit/windows/browser/adobe_flash_spsAdobe Flash Player MP4 SequenceParameterSetNALUnit Buffer Overflow
exploit/windows/browser/adobe_flash_uncompress_zlib_uninitializedAdobe Flash Player UncompressViaZlibVariant Uninitialized Memory
exploit/windows/browser/adobe_flash_worker_byte_array_uafAdobe Flash Player ByteArray With Workers Use After Free
exploit/windows/browser/adobe_flatedecode_predictor02Adobe FlateDecode Stream Predictor 02 Integer Overflow
exploit/windows/browser/adobe_geticonAdobe Collab.getIcon() Buffer Overflow
exploit/windows/browser/adobe_jbig2decodeAdobe JBIG2Decode Heap Corruption
exploit/windows/browser/adobe_media_newplayerAdobe Doc.media.newPlayer Use After Free Vulnerability
exploit/windows/browser/adobe_shockwave_rcsl_corruptionAdobe Shockwave rcsL Memory Corruption
exploit/windows/browser/adobe_toolbuttonAdobe Reader ToolButton Use After Free
exploit/windows/browser/adobe_utilprintfAdobe util.printf() Buffer Overflow
exploit/windows/browser/advantech_webaccess_dvs_getcolorAdvantech WebAccess dvs.ocx GetColor Buffer Overflow
exploit/windows/browser/aim_goawayAOL Instant Messenger goaway Overflow
exploit/windows/browser/aladdin_choosefilepath_bofAladdin Knowledge System Ltd ChooseFilePath Buffer Overflow
exploit/windows/browser/amaya_bdoAmaya Browser v11.0 'bdo' Tag Overflow
exploit/windows/browser/aol_ampx_convertfileAOL Radio AmpX ActiveX Control ConvertFile() Buffer Overflow
exploit/windows/browser/aol_icq_downloadagentAmerica Online ICQ ActiveX Control Arbitrary File Download and Execute
exploit/windows/browser/apple_itunes_playlistApple ITunes 4.7 Playlist Buffer Overflow
exploit/windows/browser/apple_quicktime_marshaled_punkApple QuickTime 7.6.7 _Marshaled_pUnk Code Execution
exploit/windows/browser/apple_quicktime_mime_typeApple QuickTime 7.7.2 MIME Type Buffer Overflow
exploit/windows/browser/apple_quicktime_rdrfApple Quicktime 7 Invalid Atom Length Buffer Overflow
exploit/windows/browser/apple_quicktime_rtspApple QuickTime 7.1.3 RTSP URI Buffer Overflow
exploit/windows/browser/apple_quicktime_smil_debugApple QuickTime 7.6.6 Invalid SMIL URI Buffer Overflow
exploit/windows/browser/apple_quicktime_texml_font_tableApple QuickTime 7.7.2 TeXML Style Element font-table Field Stack Buffer Overflow
exploit/windows/browser/ask_shortformatAsk.com Toolbar askBar.dll ActiveX Control Buffer Overflow
exploit/windows/browser/asus_net4switch_ipswcomASUS Net4Switch ipswcom.dll ActiveX Stack Buffer Overflow
exploit/windows/browser/athocgov_completeinstallationAtHocGov IWSAlerts ActiveX Control Buffer Overflow
exploit/windows/browser/autodesk_idropAutodesk IDrop ActiveX Control Heap Memory Corruption
exploit/windows/browser/aventail_epi_activexSonicWALL Aventail epi.dll AuthCredential Format String
exploit/windows/browser/awingsoft_web3d_bofAwingSoft Winds3D Player SceneURL Buffer Overflow
exploit/windows/browser/awingsoft_winds3d_sceneurlAwingSoft Winds3D Player 3.5 SceneURL Download and Execute
exploit/windows/browser/baofeng_storm_onbeforevideodownloadBaoFeng Storm mps.dll ActiveX OnBeforeVideoDownload Buffer Overflow
exploit/windows/browser/barcode_ax49RKD Software BarCodeAx.dll v4.9 ActiveX Remote Stack Buffer Overflow
exploit/windows/browser/blackice_downloadimagefileurlBlack Ice Cover Page ActiveX Control Arbitrary File Download
exploit/windows/browser/c6_messenger_downloaderactivexIcona SpA C6 Messenger DownloaderActiveX Control Arbitrary File Download and Execute
exploit/windows/browser/ca_brightstor_addcolumnCA BrightStor ARCserve Backup AddColumn() ActiveX Buffer Overflow
exploit/windows/browser/chilkat_crypt_writefileChilkat Crypt ActiveX WriteFile Unsafe Method
exploit/windows/browser/chrome_filereader_uafChrome 72.0.3626.119 FileReader UaF exploit for Windows 7 x86
exploit/windows/browser/cisco_anyconnect_execCisco AnyConnect VPN Client ActiveX URL Property Download and Execute
exploit/windows/browser/cisco_playerpt_setsourceCisco Linksys PlayerPT ActiveX Control Buffer Overflow
exploit/windows/browser/cisco_playerpt_setsource_surlCisco Linksys PlayerPT ActiveX Control SetSource sURL Argument Buffer Overflow
exploit/windows/browser/cisco_webex_extCisco WebEx Chrome Extension RCE (CVE-2017-3823)
exploit/windows/browser/citrix_gateway_actxCitrix Gateway ActiveX Control Stack Based Buffer Overflow Vulnerability
exploit/windows/browser/clear_quest_cqoleIBM Rational ClearQuest CQOle Remote Code Execution
exploit/windows/browser/communicrypt_mail_activexCommuniCrypt Mail 1.16 SMTP ActiveX Stack Buffer Overflow
exploit/windows/browser/creative_software_cachefolderCreative Software AutoUpdate Engine ActiveX Control Buffer Overflow
exploit/windows/browser/crystal_reports_printcontrolCrystal Reports CrystalPrintControl ActiveX ServerResourceVersion Property Overflow
exploit/windows/browser/dell_webcam_crazytalkDell Webcam CrazyTalk ActiveX BackImage Vulnerability
exploit/windows/browser/dxstudio_player_execWorldweaver DX Studio Player shell.execute() Command Execution
exploit/windows/browser/ea_checkrequirementsElectronic Arts SnoopyCtrl ActiveX Control Buffer Overflow
exploit/windows/browser/ebook_flipviewer_fviewerloadingFlipViewer FViewerLoading ActiveX Control Buffer Overflow
exploit/windows/browser/enjoysapgui_comp_downloadEnjoySAP SAP GUI ActiveX Control Arbitrary File Download
exploit/windows/browser/enjoysapgui_preparetoposthtmlEnjoySAP SAP GUI ActiveX Control Buffer Overflow
exploit/windows/browser/exodusExodus Wallet (ElectronJS Framework) remote Code Execution
exploit/windows/browser/facebook_extractiptcFacebook Photo Uploader 4 ActiveX Control Buffer Overflow
exploit/windows/browser/firefox_smil_uafFirefox nsSMILTimeContainer::NotifyTimeChange() RCE
exploit/windows/browser/foxit_reader_plugin_url_bofFoxit Reader Plugin URL Processing Buffer Overflow
exploit/windows/browser/getgodm_http_response_bofGetGo Download Manager HTTP Response Buffer Overflow
exploit/windows/browser/gom_openurlGOM Player ActiveX Control Buffer Overflow
exploit/windows/browser/greendam_urlGreen Dam URL Processing Buffer Overflow
exploit/windows/browser/honeywell_hscremotedeploy_execHoneywell HSC Remote Deployer ActiveX Remote Code Execution
exploit/windows/browser/honeywell_tema_execHoneywell Tema Remote Installer ActiveX Remote Code Execution
exploit/windows/browser/hp_alm_xgo_setshapenodetype_execHP Application Lifecycle Management XGO.ocx ActiveX SetShapeNodeType() Remote Code Execution
exploit/windows/browser/hp_easy_printer_care_xmlcachemgrHP Easy Printer Care XMLCacheMgr Class ActiveX Control Remote Code Execution
exploit/windows/browser/hp_easy_printer_care_xmlsimpleaccessorHP Easy Printer Care XMLSimpleAccessor Class ActiveX Control Remote Code Execution
exploit/windows/browser/hp_loadrunner_addfilePersits XUpload ActiveX AddFile Buffer Overflow
exploit/windows/browser/hp_loadrunner_addfolderHP LoadRunner 9.0 ActiveX AddFolder Buffer Overflow
exploit/windows/browser/hp_loadrunner_writefilebinaryHP LoadRunner lrFileIOService ActiveX Remote Code Execution
exploit/windows/browser/hp_loadrunner_writefilestringHP LoadRunner lrFileIOService ActiveX WriteFileString Remote Code Execution
exploit/windows/browser/hpmqc_progcolorHP Mercury Quality Center ActiveX Control ProgColor Buffer Overflow
exploit/windows/browser/hyleos_chemviewx_activexHyleos ChemView ActiveX Control Stack Buffer Overflow
exploit/windows/browser/ibmegath_getxmlvalueIBM Access Support ActiveX Control Buffer Overflow
exploit/windows/browser/ibmlotusdomino_dwa_uploadmoduleIBM Lotus Domino Web Access Upload Module Buffer Overflow
exploit/windows/browser/ibm_spss_c1sizerIBM SPSS SamplePower C1Tab ActiveX Heap Overflow
exploit/windows/browser/ibm_tivoli_pme_activex_bofIBM Tivoli Provisioning Manager Express for Software Distribution Isig.isigCtl.1 ActiveX RunAndUploadFile() Method Overflow
exploit/windows/browser/ie_cbutton_uafMS13-008 Microsoft Internet Explorer CButton Object Use-After-Free Vulnerability
exploit/windows/browser/ie_cgenericelement_uafMS13-038 Microsoft Internet Explorer CGenericElement Object Use-After-Free Vulnerability
exploit/windows/browser/ie_createobjectMS06-014 Microsoft Internet Explorer COM CreateObject Code Execution
exploit/windows/browser/ie_execcommand_uafMS12-063 Microsoft Internet Explorer execCommand Use-After-Free Vulnerability
exploit/windows/browser/ie_iscomponentinstalledMicrosoft Internet Explorer isComponentInstalled Overflow
exploit/windows/browser/ie_setmousecapture_uafMS13-080 Microsoft Internet Explorer SetMouseCapture Use-After-Free
exploit/windows/browser/ie_unsafe_scriptingMicrosoft Internet Explorer Unsafe Scripting Misconfiguration
exploit/windows/browser/imgeviewer_tifmergemultifilesViscom Image Viewer CP Pro 8.0/Gold 6.0 ActiveX Control
exploit/windows/browser/indusoft_issymbol_internationalseparatorInduSoft Web Studio ISSymbol.ocx InternationalSeparator() Heap Overflow
exploit/windows/browser/inotes_dwa85w_bofIBM Lotus iNotes dwa85W ActiveX Buffer Overflow
exploit/windows/browser/intrust_annotatex_addQuest InTrust Annotation Objects Uninitialized Pointer
exploit/windows/browser/java_basicservice_implSun Java Web Start BasicServiceImpl Code Execution
exploit/windows/browser/java_cmmJava CMM Remote Code Execution
exploit/windows/browser/java_codebase_trustSun Java Applet2ClassLoader Remote Code Execution
exploit/windows/browser/java_docbase_bofSun Java Runtime New Plugin docbase Buffer Overflow
exploit/windows/browser/java_mixer_sequencerJava MixerSequencer Object GM_Song Structure Handling Vulnerability
exploit/windows/browser/java_ws_arginject_altjvmSun Java Web Start Plugin Command Line Argument Injection
exploit/windows/browser/java_ws_double_quoteSun Java Web Start Double Quote Injection
exploit/windows/browser/java_ws_vmargsSun Java Web Start Plugin Command Line Argument Injection
exploit/windows/browser/juniper_sslvpn_ive_setupdllJuniper SSL-VPN IVE JuniperSetupDLL.dll ActiveX Control Buffer Overflow
exploit/windows/browser/kazaa_altnet_heapKazaa Altnet Download Manager ActiveX Control Buffer Overflow
exploit/windows/browser/keyhelp_launchtripane_execKeyHelp ActiveX LaunchTriPane Remote Code Execution Vulnerability
exploit/windows/browser/logitechvideocall_startLogitech VideoCall ActiveX Control Buffer Overflow
exploit/windows/browser/lpviewer_urliseemedia / Roxio / MGI Software LPViewer ActiveX Control Buffer Overflow
exploit/windows/browser/macrovision_downloadandexecuteMacrovision InstallShield Update Service Buffer Overflow
exploit/windows/browser/macrovision_unsafeMacrovision InstallShield Update Service ActiveX Unsafe Method
exploit/windows/browser/malwarebytes_update_execMalwarebytes Anti-Malware and Anti-Exploit Update Remote Code Execution
exploit/windows/browser/maxthon_history_xcsMaxthon3 about:history XCS Trusted Zone Code Execution
exploit/windows/browser/mcafee_mcsubmgr_vsprintfMcAfee Subscription Manager Stack Buffer Overflow
exploit/windows/browser/mcafee_mvt_execMcAfee Virtual Technician MVTControl 6.3.0.1911 GetObject Vulnerability
exploit/windows/browser/mcafeevisualtrace_tracetargetMcAfee Visual Trace ActiveX Control Buffer Overflow
exploit/windows/browser/mirc_irc_urlmIRC IRC URL Buffer Overflow
exploit/windows/browser/mozilla_attribchildremovedFirefox 8/9 AttributeChildRemoved() Use-After-Free
exploit/windows/browser/mozilla_firefox_onreadystatechangeFirefox onreadystatechange Event DocumentViewerImpl Use After Free
exploit/windows/browser/mozilla_firefox_xmlserializerFirefox XMLSerializer Use After Free
exploit/windows/browser/mozilla_interleaved_writeMozilla Firefox Interleaved document.write/appendChild Memory Corruption
exploit/windows/browser/mozilla_mchannelMozilla Firefox 3.6.16 mChannel Use-After-Free Vulnerability
exploit/windows/browser/mozilla_nssvgvalueFirefox nsSVGValue Out-of-Bounds Access Vulnerability
exploit/windows/browser/mozilla_nstreerangeMozilla Firefox "nsTreeRange" Dangling Pointer Vulnerability
exploit/windows/browser/mozilla_reducerightMozilla Firefox Array.reduceRight() Integer Overflow
exploit/windows/browser/ms03_020_ie_objecttypeMS03-020 Microsoft Internet Explorer Object Type
exploit/windows/browser/ms05_054_onloadMS05-054 Microsoft Internet Explorer JavaScript OnLoad Handler Remote Code Execution
exploit/windows/browser/ms06_001_wmf_setabortprocWindows XP/2003/Vista Metafile Escape() SetAbortProc Code Execution
exploit/windows/browser/ms06_013_createtextrangeMS06-013 Microsoft Internet Explorer createTextRange() Code Execution
exploit/windows/browser/ms06_055_vml_methodMS06-055 Microsoft Internet Explorer VML Fill Method Code Execution
exploit/windows/browser/ms06_057_webview_setsliceMS06-057 Microsoft Internet Explorer WebViewFolderIcon setSlice() Overflow
exploit/windows/browser/ms06_067_keyframeMS06-067 Microsoft Internet Explorer Daxctle.OCX KeyFrame Method Heap Buffer Overflow Vulnerability
exploit/windows/browser/ms06_071_xml_coreMS06-071 Microsoft Internet Explorer XML Core Services HTTP Request Handling
exploit/windows/browser/ms07_017_ani_loadimage_chunksizeWindows ANI LoadAniIcon() Chunk Size Stack Buffer Overflow (HTTP)
exploit/windows/browser/ms08_041_snapshotviewerSnapshot Viewer for Microsoft Access ActiveX Control Arbitrary File Download
exploit/windows/browser/ms08_053_mediaencoderWindows Media Encoder 9 wmex.dll ActiveX Buffer Overflow
exploit/windows/browser/ms08_070_visual_studio_msmaskMicrosoft Visual Studio Mdmask32.ocx ActiveX Buffer Overflow
exploit/windows/browser/ms08_078_xml_corruptionMS08-078 Microsoft Internet Explorer Data Binding Memory Corruption
exploit/windows/browser/ms09_002_memory_corruptionMS09-002 Microsoft Internet Explorer 7 CFunctionPointer Uninitialized Memory Corruption
exploit/windows/browser/ms09_043_owc_htmlurlMicrosoft OWC Spreadsheet HTMLURL Buffer Overflow
exploit/windows/browser/ms09_043_owc_msdsoMicrosoft OWC Spreadsheet msDataSourceObject Memory Corruption
exploit/windows/browser/ms09_072_style_objectMS09-072 Microsoft Internet Explorer Style getElementsByTagName Memory Corruption
exploit/windows/browser/ms10_002_auroraMS10-002 Microsoft Internet Explorer "Aurora" Memory Corruption
exploit/windows/browser/ms10_002_ie_objectMS10-002 Microsoft Internet Explorer Object Memory Use-After-Free
exploit/windows/browser/ms10_018_ie_behaviorsMS10-018 Microsoft Internet Explorer DHTML Behaviors Use After Free
exploit/windows/browser/ms10_018_ie_tabular_activexMS10-018 Microsoft Internet Explorer Tabular Data Control ActiveX Memory Corruption
exploit/windows/browser/ms10_022_ie_vbscript_winhlp32MS10-022 Microsoft Internet Explorer Winhlp32.exe MsgBox Code Execution
exploit/windows/browser/ms10_026_avi_nsamplespersecMS10-026 Microsoft MPEG Layer-3 Audio Stack Based Overflow
exploit/windows/browser/ms10_042_helpctr_xss_cmd_execMicrosoft Help Center XSS and Command Execution
exploit/windows/browser/ms10_046_shortcut_icon_dllloaderMicrosoft Windows Shell LNK Code Execution
exploit/windows/browser/ms10_090_ie_css_clipMS10-090 Microsoft Internet Explorer CSS SetUserClip Memory Corruption
exploit/windows/browser/ms11_003_ie_css_importMS11-003 Microsoft Internet Explorer CSS Recursive Import Use After Free
exploit/windows/browser/ms11_050_mshtml_cobjectelementMS11-050 IE mshtml!CObjectElement Use After Free
exploit/windows/browser/ms11_081_optionMS11-081 Microsoft Internet Explorer Option Element Use-After-Free
exploit/windows/browser/ms11_093_ole32MS11-093 Microsoft Windows OLE Object File Handling Remote Code Execution
exploit/windows/browser/ms12_004_midiMS12-004 midiOutPlayNextPolyEvent Heap Overflow
exploit/windows/browser/ms12_037_ie_colspanMS12-037 Microsoft Internet Explorer Fixed Table Col Span Heap Overflow
exploit/windows/browser/ms12_037_same_idMS12-037 Microsoft Internet Explorer Same ID Property Deleted Object Handling Memory Corruption
exploit/windows/browser/ms13_009_ie_slayoutrun_uafMS13-009 Microsoft Internet Explorer SLayoutRun Use-After-Free
exploit/windows/browser/ms13_022_silverlight_script_objectMS13-022 Microsoft Silverlight ScriptObject Unsafe Memory Access
exploit/windows/browser/ms13_037_svg_dashstyleMS13-037 Microsoft Internet Explorer COALineDashStyleArray Integer Overflow
exploit/windows/browser/ms13_055_canchorMS13-055 Microsoft Internet Explorer CAnchorElement Use-After-Free
exploit/windows/browser/ms13_059_cflatmarkuppointerMS13-059 Microsoft Internet Explorer CFlatMarkupPointer Use-After-Free
exploit/windows/browser/ms13_069_caretMS13-069 Microsoft Internet Explorer CCaret Use-After-Free
exploit/windows/browser/ms13_080_cdisplaypointerMS13-080 Microsoft Internet Explorer CDisplayPointer Use-After-Free
exploit/windows/browser/ms13_090_cardspacesigninhelperMS13-090 CardSpaceClaimCollection ActiveX Integer Underflow
exploit/windows/browser/ms14_012_cmarkup_uafMS14-012 Microsoft Internet Explorer CMarkup Use-After-Free
exploit/windows/browser/ms14_012_textrangeMS14-012 Microsoft Internet Explorer TextRange Use-After-Free
exploit/windows/browser/ms14_064_ole_code_executionMS14-064 Microsoft Internet Explorer Windows OLE Automation Array Remote Code Execution
exploit/windows/browser/ms16_051_vbscriptInternet Explorer 11 VBScript Engine Memory Corruption
exploit/windows/browser/msvidctl_mpeg2Microsoft DirectShow (msvidctl.dll) MPEG-2 Memory Corruption
exploit/windows/browser/mswhale_checkforupdatesMicrosoft Whale Intelligent Application Gateway ActiveX Control Buffer Overflow
exploit/windows/browser/msxml_get_definition_code_execMS12-043 Microsoft XML Core Services MSXML Uninitialized Memory Corruption
exploit/windows/browser/nctaudiofile2_setformatlikesampleNCTAudioFile2 v2.x ActiveX Control SetFormatLikeSample() Buffer Overflow
exploit/windows/browser/nis2004_antispamNorton AntiSpam 2004 SymSpamHelper ActiveX Control Buffer Overflow
exploit/windows/browser/nis2004_getSymantec Norton Internet Security 2004 ActiveX Control Buffer Overflow
exploit/windows/browser/notes_handler_cmdinjectIBM Lotus Notes Client URL Handler Command Injection
exploit/windows/browser/novell_groupwise_gwcls1_actvxNovell GroupWise Client gwcls1.dll ActiveX Remote Code Execution
exploit/windows/browser/novelliprint_callbackurlNovell iPrint Client ActiveX Control call-back-url Buffer Overflow
exploit/windows/browser/novelliprint_datetimeNovell iPrint Client ActiveX Control Date/Time Buffer Overflow
exploit/windows/browser/novelliprint_executerequest_dbgNovell iPrint Client ActiveX Control ExecuteRequest debug Buffer Overflow
exploit/windows/browser/novelliprint_executerequestNovell iPrint Client ActiveX Control ExecuteRequest Buffer Overflow
exploit/windows/browser/novelliprint_getdriversettings_2Novell iPrint Client ActiveX Control Buffer Overflow
exploit/windows/browser/novelliprint_getdriversettingsNovell iPrint Client ActiveX Control Buffer Overflow
exploit/windows/browser/novelliprint_target_frameNovell iPrint Client ActiveX Control target-frame Buffer Overflow
exploit/windows/browser/ntr_activex_check_bofNTR ActiveX Control Check() Method Buffer Overflow
exploit/windows/browser/ntr_activex_stopmoduleNTR ActiveX Control StopModule() Remote Code Execution
exploit/windows/browser/oracle_autovue_setmarkupmodeOracle AutoVue ActiveX Control SetMarkupMode Buffer Overflow
exploit/windows/browser/oracle_dc_submittoexpressOracle Document Capture 10g ActiveX Control Buffer Overflow
exploit/windows/browser/oracle_webcenter_checkoutandopenOracle WebCenter Content CheckOutAndOpen.dll ActiveX Remote Code Execution
exploit/windows/browser/orbit_connectingOrbit Downloader Connecting Log Creation Buffer Overflow
exploit/windows/browser/ovftool_format_stringVMWare OVF Tools Format String Vulnerability
exploit/windows/browser/pcvue_funcPcVue 10.0 SV.UIGrdCtrl.1 'LoadObject()/SaveObject()' Trusted DWORD Vulnerability
exploit/windows/browser/persits_xupload_traversalPersits XUpload ActiveX MakeHttpRequest Directory Traversal
exploit/windows/browser/quickr_qp2_bofIBM Lotus QuickR qp2 ActiveX Buffer Overflow
exploit/windows/browser/real_arcade_installerdlgReal Networks Arcade Games StubbyUtil.ProcessMgr ActiveX Arbitrary Code Execution
exploit/windows/browser/realplayer_cdda_uriRealNetworks RealPlayer CDDA URI Initialization Vulnerability
exploit/windows/browser/realplayer_consoleRealPlayer rmoc3260.dll ActiveX Control Heap Corruption
exploit/windows/browser/realplayer_importRealPlayer ierpplug.dll ActiveX Control Playlist Name Buffer Overflow
exploit/windows/browser/realplayer_qcpRealNetworks Realplayer QCP Parsing Heap Overflow
exploit/windows/browser/realplayer_smilRealNetworks RealPlayer SMIL Buffer Overflow
exploit/windows/browser/roxio_cineplayerRoxio CinePlayer ActiveX Control Buffer Overflow
exploit/windows/browser/safari_xslt_outputApple Safari Webkit libxslt Arbitrary File Creation
exploit/windows/browser/samsung_neti_wiewer_backuptoavi_bofSamsung NET-i Viewer Multiple ActiveX BackupToAvi() Remote Overflow
exploit/windows/browser/samsung_security_manager_putSamsung Security Manager 1.4 ActiveMQ Broker Service PUT Method Remote Code Execution
exploit/windows/browser/sapgui_saveviewtosessionfileSAP AG SAPgui EAI WebViewer3D Buffer Overflow
exploit/windows/browser/siemens_solid_edge_selistctrlxSiemens Solid Edge ST4 SEListCtrlX ActiveX Remote Code Execution
exploit/windows/browser/softartisans_getdrivenameSoftArtisans XFile FileManager ActiveX Control Buffer Overflow
exploit/windows/browser/sonicwall_addrouteentrySonicWall SSL-VPN NetExtender ActiveX Control Buffer Overflow
exploit/windows/browser/symantec_altirisdeployment_downloadandinstallSymantec Altiris Deployment Solution ActiveX Control Arbitrary File Download and Execute
exploit/windows/browser/symantec_altirisdeployment_runcmdSymantec Altiris Deployment Solution ActiveX Control Buffer Overflow
exploit/windows/browser/symantec_appstream_unsafeSymantec AppStream LaunchObj ActiveX Control Arbitrary File Download and Execute
exploit/windows/browser/symantec_backupexec_pvcalendarSymantec BackupExec Calendar Control Buffer Overflow
exploit/windows/browser/symantec_consoleutilities_browseandsavefileSymantec ConsoleUtilities ActiveX Control Buffer Overflow
exploit/windows/browser/synactis_connecttosynactis_bofSynactis PDF In-The-Box ConnectToSynactic Stack Buffer Overflow
exploit/windows/browser/systemrequirementslab_unsafeHusdawg, LLC. System Requirements Lab ActiveX Unsafe Method
exploit/windows/browser/teechart_proTeeChart Professional ActiveX Control Trusted Integer Dereference
exploit/windows/browser/tom_sawyer_tsgetx71ex552Tom Sawyer Software GET Extension Factory Remote Code Execution
exploit/windows/browser/trendmicro_extsetownerTrend Micro Internet Security Pro 2010 ActiveX extSetOwner() Remote Code Execution
exploit/windows/browser/trendmicro_officescanTrend Micro OfficeScan Client ActiveX Control Buffer Overflow
exploit/windows/browser/tumbleweed_filetransferTumbleweed FileTransfer vcst_eu.dll ActiveX Control Buffer Overflow
exploit/windows/browser/ubisoft_uplay_cmd_execUbisoft uplay 2.0.3 ActiveX Control Arbitrary Code Execution
exploit/windows/browser/ultramjcam_openfiledig_bofTRENDnet SecurView Internet Camera UltraMJCam OpenFileDlg Buffer Overflow
exploit/windows/browser/ultraoffice_httpuploadUltra Shareware Office Control ActiveX HttpUpload Buffer Overflow
exploit/windows/browser/verypdf_pdfviewVeryPDF PDFView OCX ActiveX OpenPDF Heap Overflow
exploit/windows/browser/viscom_movieplayer_drawtextViscom Software Movie Player Pro SDK ActiveX 6.8
exploit/windows/browser/vlc_amvVLC AMV Dangling Pointer Vulnerability
exploit/windows/browser/vlc_mms_bofVLC MMS Stream Handling Buffer Overflow
exploit/windows/browser/webdav_dll_hijackerWebDAV Application DLL Hijacker
exploit/windows/browser/webex_ucf_newobjectWebEx UCF atucfobj.dll ActiveX NewObject Method Buffer Overflow
exploit/windows/browser/wellintech_kingscada_kxclientdownloadKingScada kxClientDownload.ocx ActiveX Remote Code Execution
exploit/windows/browser/winamp_playlist_uncWinamp Playlist UNC Path Computer Name Overflow
exploit/windows/browser/winamp_ultravoxWinamp Ultravox Streaming Metadata (in_mp3.dll) Buffer Overflow
exploit/windows/browser/windvd7_applicationtypeWinDVD7 IASystemInfo.DLL ActiveX Control Buffer Overflow
exploit/windows/browser/winzip_fileviewWinZip FileView (WZFILEVIEW.FileViewCtrl.61) ActiveX Buffer Overflow
exploit/windows/browser/wmi_admintoolsMicrosoft WMI Administration Tools ActiveX Buffer Overflow
exploit/windows/browser/x360_video_player_set_text_bofX360 VideoPlayer ActiveX Control Buffer Overflow
exploit/windows/browser/xmplay_asxXMPlay 3.3.0.4 (ASX Filename) Buffer Overflow
exploit/windows/browser/yahoomessenger_fvcomYahoo! Messenger YVerInfo.dll ActiveX Control Buffer Overflow
exploit/windows/browser/yahoomessenger_serverYahoo! Messenger 8.1.0.249 ActiveX Control Buffer Overflow
exploit/windows/browser/zenturiprogramchecker_unsafeZenturi ProgramChecker ActiveX Control Arbitrary File Download
exploit/windows/browser/zenworks_helplauncher_execAdminStudio LaunchHelp.dll ActiveX Arbitrary Code Execution
exploit/windows/dcerpc/cve_2021_1675_printnightmarePrint Spooler Remote DLL Injection
exploit/windows/dcerpc/ms03_026_dcomMS03-026 Microsoft RPC DCOM Interface Overflow
exploit/windows/dcerpc/ms05_017_msmqMS05-017 Microsoft Message Queueing Service Path Overflow
exploit/windows/dcerpc/ms07_029_msdns_zonenameMS07-029 Microsoft DNS RPC Service extractQuotedChar() Overflow (TCP)
exploit/windows/dcerpc/ms07_065_msmqMS07-065 Microsoft Message Queueing Service DNS Name Path Overflow
exploit/windows/email/ms07_017_ani_loadimage_chunksizeWindows ANI LoadAniIcon() Chunk Size Stack Buffer Overflow (SMTP)
exploit/windows/email/ms10_045_outlook_ref_onlyOutlook ATTACH_BY_REF_ONLY File Execution
exploit/windows/email/ms10_045_outlook_ref_resolveOutlook ATTACH_BY_REF_RESOLVE File Execution
exploit/windows/emc/alphastor_agentEMC AlphaStor Agent Buffer Overflow
exploit/windows/emc/alphastor_device_manager_execEMC AlphaStor Device Manager Opcode 0x75 Command Injection
exploit/windows/emc/networker_format_stringEMC Networker Format String
exploit/windows/emc/replication_manager_execEMC Replication Manager Command Execution
exploit/windows/fileformat/abbs_amp_lstABBS Audio Media Player .LST Buffer Overflow
exploit/windows/fileformat/acdsee_fotoslate_stringACDSee FotoSlate PLP File id Parameter Overflow
exploit/windows/fileformat/acdsee_xpmACDSee XPM File Section Buffer Overflow
exploit/windows/fileformat/actfax_import_users_bofActiveFax (ActFax) 4.3 Client Importer Buffer Overflow
exploit/windows/fileformat/activepdf_webgrabberactivePDF WebGrabber ActiveX Control Buffer Overflow
exploit/windows/fileformat/adobe_collectemailinfoAdobe Collab.collectEmailInfo() Buffer Overflow
exploit/windows/fileformat/adobe_cooltype_singAdobe CoolType SING Table "uniqueName" Stack Buffer Overflow
exploit/windows/fileformat/adobe_flashplayer_buttonAdobe Flash Player "Button" Remote Code Execution
exploit/windows/fileformat/adobe_flashplayer_newfunctionAdobe Flash Player "newfunction" Invalid Pointer Use
exploit/windows/fileformat/adobe_flatedecode_predictor02Adobe FlateDecode Stream Predictor 02 Integer Overflow
exploit/windows/fileformat/adobe_geticonAdobe Collab.getIcon() Buffer Overflow
exploit/windows/fileformat/adobe_illustrator_v14_epsAdobe Illustrator CS4 v14.0.0
exploit/windows/fileformat/adobe_jbig2decodeAdobe JBIG2Decode Memory Corruption
exploit/windows/fileformat/adobe_libtiffAdobe Acrobat Bundled LibTIFF Integer Overflow
exploit/windows/fileformat/adobe_media_newplayerAdobe Doc.media.newPlayer Use After Free Vulnerability
exploit/windows/fileformat/adobe_pdf_embedded_exeAdobe PDF Embedded EXE Social Engineering
exploit/windows/fileformat/adobe_pdf_embedded_exe_nojsAdobe PDF Escape EXE Social Engineering (No JavaScript)
exploit/windows/fileformat/adobe_reader_u3dAdobe Reader U3D Memory Corruption Vulnerability
exploit/windows/fileformat/adobe_toolbuttonAdobe Reader ToolButton Use After Free
exploit/windows/fileformat/adobe_u3d_meshdeclAdobe U3D CLODProgressiveMeshDeclaration Array Overrun
exploit/windows/fileformat/adobe_utilprintfAdobe util.printf() Buffer Overflow
exploit/windows/fileformat/allplayer_m3u_bofALLPlayer M3U Buffer Overflow
exploit/windows/fileformat/altap_salamander_pdbAltap Salamander 2.5 PE Viewer Buffer Overflow
exploit/windows/fileformat/aol_desktop_linktagAOL Desktop 9.6 RTX Buffer Overflow
exploit/windows/fileformat/aol_phobos_bofAOL 9.5 Phobos.Playlist Import() Stack-based Buffer Overflow
exploit/windows/fileformat/a_pdf_wav_to_mp3A-PDF WAV to MP3 v1.0.0 Buffer Overflow
exploit/windows/fileformat/apple_quicktime_pnsizeApple QuickTime PICT PnSize Buffer Overflow
exploit/windows/fileformat/apple_quicktime_rdrfApple Quicktime 7 Invalid Atom Length Buffer Overflow
exploit/windows/fileformat/apple_quicktime_texmlApple QuickTime TeXML Style Element Stack Buffer Overflow
exploit/windows/fileformat/audio_coder_m3uAudioCoder .M3U Buffer Overflow
exploit/windows/fileformat/audiotran_pls_1424Audiotran PLS File Stack Buffer Overflow
exploit/windows/fileformat/audiotran_plsAudiotran 1.4.1 (PLS File) Stack Buffer Overflow
exploit/windows/fileformat/audio_wkstn_plsAudio Workstation 6.4.2.4.3 pls Buffer Overflow
exploit/windows/fileformat/aviosoft_plf_bufAviosoft Digital TV Player Professional 1.0 Stack Buffer Overflow
exploit/windows/fileformat/bacnet_csvBACnet OPC Client Buffer Overflow
exploit/windows/fileformat/beetel_netconfig_ini_bofBeetel Connection Manager NetConfig.ini Buffer Overflow
exploit/windows/fileformat/blazedvd_hdtv_bofBlazeVideo HDTV Player Pro v6.6 Filename Handling Vulnerability
exploit/windows/fileformat/blazedvd_plfBlazeDVD 6.1 PLF Buffer Overflow
exploit/windows/fileformat/boxoft_wav_to_mp3Boxoft WAV to MP3 Converter v1.1 Buffer Overflow
exploit/windows/fileformat/bpftp_client_bps_bofBulletProof FTP Client BPS Buffer Overflow
exploit/windows/fileformat/bsplayer_m3uBS.Player 2.57 Buffer Overflow (Unicode SEH)
exploit/windows/fileformat/ca_cabCA Antivirus Engine CAB Buffer Overflow
exploit/windows/fileformat/cain_abel_4918_rdpCain and Abel RDP Buffer Overflow
exploit/windows/fileformat/ccmplayer_m3u_bofCCMPlayer 1.5 m3u Playlist Stack Based Buffer Overflow
exploit/windows/fileformat/chasys_draw_ies_bmp_bofChasys Draw IES Buffer Overflow
exploit/windows/fileformat/coolpdf_image_stream_bofCool PDF Image Stream Buffer Overflow
exploit/windows/fileformat/corelpdf_fusion_bofCorel PDF Fusion Stack Buffer Overflow
exploit/windows/fileformat/csound_getnum_bofCsound hetro File Handling Stack Buffer Overflow
exploit/windows/fileformat/cutezip_bofGlobalSCAPE CuteZIP Stack Buffer Overflow
exploit/windows/fileformat/cve_2017_8464_lnk_rceLNK Code Execution Vulnerability
exploit/windows/fileformat/cyberlink_lpp_bofCyberLink LabelPrint 2.5 Stack Buffer Overflow
exploit/windows/fileformat/cyberlink_p2g_bofCyberLink Power2Go name Attribute (p2g) Stack Buffer Overflow Exploit
exploit/windows/fileformat/cytel_studio_cy3Cytel Studio 9.0 (CY3 File) Stack Buffer Overflow
exploit/windows/fileformat/deepburner_pathAstonSoft DeepBurner (DBR File) Path Buffer Overflow
exploit/windows/fileformat/destinymediaplayer16Destiny Media Player 1.61 PLS M3U Buffer Overflow
exploit/windows/fileformat/digital_music_pad_plsDigital Music Pad Version 8.2.3.3.4 Stack Buffer Overflow
exploit/windows/fileformat/djstudio_pls_bofDJ Studio Pro 5.1 .pls Stack Buffer Overflow
exploit/windows/fileformat/djvu_imageurlDjVu DjVu_ActiveX_MSOffice.dll ActiveX ComponentBuffer Overflow
exploit/windows/fileformat/documalis_pdf_editor_and_scannerDocumalis Free PDF Editor and Scanner JPEG Stack Buffer Overflow
exploit/windows/fileformat/dupscout_xmlDup Scout Enterprise v10.4.16 - Import Command Buffer Overflow
exploit/windows/fileformat/dvdx_plf_bofDVD X Player 5.5 .plf PlayList Buffer Overflow
exploit/windows/fileformat/easycdda_pls_bofEasy CD-DA Recorder PLS Buffer Overflow
exploit/windows/fileformat/emc_appextender_keyworksEMC ApplicationXtender (KeyWorks) ActiveX Control Buffer Overflow
exploit/windows/fileformat/erdas_er_viewer_bofERS Viewer 2011 ERS File Handling Buffer Overflow
exploit/windows/fileformat/erdas_er_viewer_rf_report_errorERS Viewer 2013 ERS File Handling Buffer Overflow
exploit/windows/fileformat/esignal_styletemplate_bofeSignal and eSignal Pro File Parsing Buffer Overflow in QUO
exploit/windows/fileformat/etrust_pestscanCA eTrust PestPatrol ActiveX Control Buffer Overflow
exploit/windows/fileformat/ezip_wizard_bofeZip Wizard 3.0 Stack Buffer Overflow
exploit/windows/fileformat/fatplayer_wavFat Player Media Player 0.6b0 Buffer Overflow
exploit/windows/fileformat/fdm_torrentFree Download Manager Torrent Parsing Buffer Overflow
exploit/windows/fileformat/feeddemon_opmlFeedDemon Stack Buffer Overflow
exploit/windows/fileformat/foxit_reader_filewriteFoxit PDF Reader 4.2 Javascript File Write
exploit/windows/fileformat/foxit_reader_launchFoxit Reader 3.0 Open Execute Action Stack Based Buffer Overflow
exploit/windows/fileformat/foxit_reader_uafFoxit PDF Reader Pointer Overwrite UAF
exploit/windows/fileformat/foxit_title_bofFoxit PDF Reader v4.1.1 Title Stack Buffer Overflow
exploit/windows/fileformat/free_mp3_ripper_wavFree MP3 CD Ripper 1.1 WAV File Stack Buffer Overflow
exploit/windows/fileformat/galan_fileformat_bofgAlan 0.2.1 Buffer Overflow
exploit/windows/fileformat/gsm_simGSM SIM Editor 5.15 Buffer Overflow
exploit/windows/fileformat/gta_sampGTA SA-MP server.cfg Buffer Overflow
exploit/windows/fileformat/hhw_hhp_compiledfile_bofHTML Help Workshop 4.74 (hhp Project File) Buffer Overflow
exploit/windows/fileformat/hhw_hhp_contentfile_bofHTML Help Workshop 4.74 (hhp Project File) Buffer Overflow
exploit/windows/fileformat/hhw_hhp_indexfile_bofHTML Help Workshop 4.74 (hhp Project File) Buffer Overflow
exploit/windows/fileformat/homm3_h3mHeroes of Might and Magic III .h3m Map file Buffer Overflow
exploit/windows/fileformat/ht_mp3player_ht3_bofHT-MP3Player 1.0 HT3 File Parsing Buffer Overflow
exploit/windows/fileformat/ibm_forms_viewer_fontnameIBM Forms Viewer Unicode Buffer Overflow
exploit/windows/fileformat/ibm_pcm_wsIBM Personal Communications iSeries Access WorkStation 5.9 Profile
exploit/windows/fileformat/icofx_bofIcoFX Stack Buffer Overflow
exploit/windows/fileformat/ideal_migration_ipjPointDev IDEAL Migration Buffer Overflow
exploit/windows/fileformat/iftp_schedule_bofi-FTP Schedule Buffer Overflow
exploit/windows/fileformat/irfanview_jpeg2000_bofIrfanview JPEG2000 jp2 Stack Buffer Overflow
exploit/windows/fileformat/ispvm_xcf_ispxcfLattice Semiconductor ispVM System XCF File Handling Overflow
exploit/windows/fileformat/kingview_kingmess_kvlKingView Log File Parsing Buffer Overflow
exploit/windows/fileformat/lattice_pac_bofLattice Semiconductor PAC-Designer 6.21 Symbol Value Buffer Overflow
exploit/windows/fileformat/lotusnotes_lzhLotus Notes 8.0.x - 8.5.2 FP2 - Autonomy Keyview (.lzh Attachment)
exploit/windows/fileformat/magix_musikmaker_16_mmmMagix Musik Maker 16 .mmm Stack Buffer Overflow
exploit/windows/fileformat/mcafee_hercules_deletesnapshotMcAfee Remediation Client ActiveX Control Buffer Overflow
exploit/windows/fileformat/mcafee_showreport_execMcAfee SaaS MyCioScan ShowReport Remote Command Execution
exploit/windows/fileformat/mediacoder_m3uMediaCoder .M3U Buffer Overflow
exploit/windows/fileformat/mediajukeboxMedia Jukebox 8.0.400 Buffer Overflow (SEH)
exploit/windows/fileformat/microp_mpplMicroP 0.1.1.1600 (MPPL File) Stack Buffer Overflow
exploit/windows/fileformat/microsoft_windows_contactMicrosoft Windows Contact File Format Arbitary Code Execution
exploit/windows/fileformat/millenium_mp3_plsMillenium MP3 Studio 2.0 (PLS File) Stack Buffer Overflow
exploit/windows/fileformat/mini_stream_pls_bofMini-Stream RM-MP3 Converter v3.1.2.1 PLS File Stack Buffer Overflow
exploit/windows/fileformat/mjm_coreplayer2011_s3mMJM Core Player 2011 .s3m Stack Buffer Overflow
exploit/windows/fileformat/mjm_quickplayer_s3mMJM QuickPlayer 1.00 Beta 60a / QuickPlayer 2010 .s3m Stack Buffer Overflow
exploit/windows/fileformat/moxa_mediadbplaybackMOXA MediaDBPlayback ActiveX Control Buffer Overflow
exploit/windows/fileformat/mplayer_m3u_bofMPlayer Lite M3U Buffer Overflow
exploit/windows/fileformat/mplayer_sami_bofMPlayer SAMI Subtitle File Buffer Overflow
exploit/windows/fileformat/ms09_067_excel_featheaderMS09-067 Microsoft Excel Malformed FEATHEADER Record Vulnerability
exploit/windows/fileformat/ms10_004_textbytesatomMS10-004 Microsoft PowerPoint Viewer TextBytesAtom Stack Buffer Overflow
exploit/windows/fileformat/ms10_038_excel_obj_bofMS11-038 Microsoft Office Excel Malformed OBJ Record Handling Overflow
exploit/windows/fileformat/ms10_087_rtf_pfragments_bofMS10-087 Microsoft Word RTF pFragments Stack Buffer Overflow (File Format)
exploit/windows/fileformat/ms11_006_createsizeddibsectionMS11-006 Microsoft Windows CreateSizedDIBSECTION Stack Buffer Overflow
exploit/windows/fileformat/ms11_021_xlb_bofMS11-021 Microsoft Office 2007 Excel .xlb Buffer Overflow
exploit/windows/fileformat/ms12_005MS12-005 Microsoft Office ClickOnce Unsafe Object Package Handling Vulnerability
exploit/windows/fileformat/ms12_027_mscomctl_bofMS12-027 MSCOMCTL ActiveX Buffer Overflow
exploit/windows/fileformat/ms13_071_themeMS13-071 Microsoft Windows Theme File Handling Arbitrary Code Execution
exploit/windows/fileformat/ms14_017_rtfMS14-017 Microsoft Word RTF Object Confusion
exploit/windows/fileformat/ms14_060_sandwormMS14-060 Microsoft Windows OLE Package Manager Code Execution
exploit/windows/fileformat/ms14_064_packager_pythonMS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python
exploit/windows/fileformat/ms14_064_packager_run_as_adminMS14-064 Microsoft Windows OLE Package Manager Code Execution
exploit/windows/fileformat/ms15_020_shortcut_icon_dllloaderMicrosoft Windows Shell LNK Code Execution
exploit/windows/fileformat/ms15_100_mcl_exeMS15-100 Microsoft Windows Media Center MCL Vulnerability
exploit/windows/fileformat/ms_visual_basic_vbpMicrosoft Visual Basic VBP Buffer Overflow
exploit/windows/fileformat/mswin_tiff_overflowMS13-096 Microsoft Tagged Image File Format (TIFF) Integer Overflow
exploit/windows/fileformat/msworks_wkspictureinterfaceMicrosoft Works 7 WkImgSrv.dll WKsPictureInterface() ActiveX Code Execution
exploit/windows/fileformat/mymp3player_m3uSteinberg MyMP3Player 3.0 Buffer Overflow
exploit/windows/fileformat/netopNetOp Remote Control Client 9.5 Buffer Overflow
exploit/windows/fileformat/nitro_reader_jsapiNitro Pro PDF Reader 11.0.3.173 Javascript API Remote Code Execution
exploit/windows/fileformat/nuance_pdf_launch_overflowNuance PDF Reader v6.0 Launch Stack Buffer Overflow
exploit/windows/fileformat/office_dde_deliveryMicrosoft Office DDE Payload Delivery
exploit/windows/fileformat/office_excel_slkMicrosoft Excel .SLK Payload Delivery
exploit/windows/fileformat/office_ms17_11882Microsoft Office CVE-2017-11882
exploit/windows/fileformat/office_ole_multiple_dll_hijackOffice OLE Multiple DLL Side Loading Vulnerabilities
exploit/windows/fileformat/office_word_htaMicrosoft Office Word Malicious Hta Execution
exploit/windows/fileformat/openoffice_oleOpenOffice OLE Importer DocumentSummaryInformation Stream Handling Overflow
exploit/windows/fileformat/orbital_viewer_orbOrbital Viewer ORB File Parsing Buffer Overflow
exploit/windows/fileformat/orbit_download_failed_bofOrbit Downloader URL Unicode Conversion Overflow
exploit/windows/fileformat/ovf_format_stringVMWare OVF Tools Format String Vulnerability
exploit/windows/fileformat/proshow_cellimage_bofProShow Gold v4.0.2549 (PSH File) Stack Buffer Overflow
exploit/windows/fileformat/proshow_load_bofPhotodex ProShow Producer 5.0.3256 load File Handling Buffer Overflow
exploit/windows/fileformat/publishit_puiPublish-It PUI Buffer Overflow (SEH)
exploit/windows/fileformat/real_networks_netzip_bofReal Networks Netzip Classic 7.5.1 86 File Parsing Buffer Overflow Vulnerability
exploit/windows/fileformat/real_player_url_property_bofRealPlayer RealMedia File Handling Buffer Overflow
exploit/windows/fileformat/realplayer_ver_attribute_bofRealNetworks RealPlayer Version Attribute Buffer Overflow
exploit/windows/fileformat/safenet_softremote_groupnameSafeNet SoftRemote GROUPNAME Buffer Overflow
exploit/windows/fileformat/sascam_getSasCam Webcam Server v.2.6.5 Get() Method Buffer Overflow
exploit/windows/fileformat/scadaphone_zipScadaTEC ScadaPhone Stack Buffer Overflow
exploit/windows/fileformat/shadow_stream_recorder_bofShadow Stream Recorder 3.0.1.7 Buffer Overflow
exploit/windows/fileformat/shaper_pdf_bofPDF Shaper Buffer Overflow
exploit/windows/fileformat/somplplayer_m3uS.O.M.P.L 1.0 Player Buffer Overflow
exploit/windows/fileformat/subtitle_processor_m3u_bofSubtitle Processor 7.7.1 .M3U SEH Unicode Buffer Overflow
exploit/windows/fileformat/syncbreeze_xmlSync Breeze Enterprise 9.5.16 - Import Command Buffer Overflow
exploit/windows/fileformat/tfm_mmplayer_m3u_ppl_bofTFM MMPlayer (m3u/ppl File) Buffer Overflow
exploit/windows/fileformat/total_video_player_ini_bofTotal Video Player 1.3.1 (Settings.ini) - SEH Buffer Overflow
exploit/windows/fileformat/tugzipTugZip 3.5 Zip File Parsing Buffer Overflow Vulnerability
exploit/windows/fileformat/ultraiso_ccdUltraISO CCD File Parsing Buffer Overflow
exploit/windows/fileformat/ultraiso_cueUltraISO CUE File Parsing Buffer Overflow
exploit/windows/fileformat/ursoft_w32dasmURSoft W32Dasm Disassembler Function Buffer Overflow
exploit/windows/fileformat/varicad_dwbVariCAD 2010-2.05 EN (DWB File) Stack Buffer Overflow
exploit/windows/fileformat/videocharge_studioVideoCharge Studio Buffer Overflow (SEH)
exploit/windows/fileformat/videolan_tivoVideoLAN VLC TiVo Buffer Overflow
exploit/windows/fileformat/videospirit_visprjVeryTools Video Spirit Pro
exploit/windows/fileformat/visio_dxf_bofMicrosoft Office Visio VISIODWG.DLL DXF File Handling Vulnerability
exploit/windows/fileformat/visiwave_vwr_typeVisiWave VWR File Parsing Vulnerability
exploit/windows/fileformat/vlc_mkvVLC Media Player MKV Use After Free
exploit/windows/fileformat/vlc_modplug_s3mVideoLAN VLC ModPlug ReadS3M Stack Buffer Overflow
exploit/windows/fileformat/vlc_realtextVLC Media Player RealText Subtitle Overflow
exploit/windows/fileformat/vlc_smb_uriVideoLAN Client (VLC) Win32 smb:// URI Buffer Overflow
exploit/windows/fileformat/vlc_webmVideoLAN VLC MKV Memory Corruption
exploit/windows/fileformat/vuplayer_cueVUPlayer CUE Buffer Overflow
exploit/windows/fileformat/vuplayer_m3uVUPlayer M3U Buffer Overflow
exploit/windows/fileformat/watermark_masterWatermark Master Buffer Overflow (SEH)
exploit/windows/fileformat/winamp_maki_bofWinamp MAKI Buffer Overflow
exploit/windows/fileformat/winrar_aceRARLAB WinRAR ACE Format Input Validation Remote Code Execution
exploit/windows/fileformat/winrar_name_spoofingWinRAR Filename Spoofing
exploit/windows/fileformat/wireshark_mpeg_overflowWireshark wiretap/mpeg.c Stack Buffer Overflow
exploit/windows/fileformat/wireshark_packet_dectWireshark packet-dect.c Stack Buffer Overflow (local)
exploit/windows/fileformat/wm_downloader_m3uWM Downloader 3.1.2.2 Buffer Overflow
exploit/windows/fileformat/word_msdtjs_rceMicrosoft Office Word MSDTJS
exploit/windows/fileformat/word_mshtml_rceMicrosoft Office Word Malicious MSHTML RCE
exploit/windows/fileformat/xenorate_xpl_bofXenorate 2.50 (.xpl) Universal Local Buffer Overflow (SEH)
exploit/windows/fileformat/xion_m3u_sehbofXion Audio Player 1.0.126 Unicode Stack Buffer Overflow
exploit/windows/fileformat/xradio_xrl_sehbofxRadio 0.95b Buffer Overflow
exploit/windows/fileformat/zahir_enterprise_plus_csvZahir Enterprise Plus 6 Stack Buffer Overflow
exploit/windows/fileformat/zinfaudioplayer221_plsZinf Audio Player 2.2.1 (PLS File) Stack Buffer Overflow
exploit/windows/firewall/blackice_pam_icqISS PAM.dll ICQ Parser Buffer Overflow
exploit/windows/firewall/kerio_authKerio Firewall 2.1.4 Authentication Packet Overflow
exploit/windows/ftp/32bitftp_list_reply32bit FTP Client Stack Buffer Overflow
exploit/windows/ftp/3cdaemon_ftp_user3Com 3CDaemon 2.0 FTP Username Overflow
exploit/windows/ftp/aasync_list_replyAASync v2.2.1.0 (Win32) Stack Buffer Overflow (LIST)
exploit/windows/ftp/ability_server_storAbility Server 2.34 STOR Command Stack Buffer Overflow
exploit/windows/ftp/absolute_ftp_list_bofAbsoluteFTP 1.9.6 - 2.2.10 LIST Command Remote Buffer Overflow
exploit/windows/ftp/ayukov_nftpAyukov NFTP FTP Client Buffer Overflow
exploit/windows/ftp/bison_ftp_bofBisonWare BisonFTP Server Buffer Overflow
exploit/windows/ftp/cesarftp_mkdCesar FTP 0.99g MKD Command Buffer Overflow
exploit/windows/ftp/comsnd_ftpd_fmtstrComSndFTP v1.3.7 Beta USER Format String (Write4) Vulnerability
exploit/windows/ftp/dreamftp_formatBolinTech Dream FTP Server 1.02 Format String
exploit/windows/ftp/easyfilesharing_passEasy File Sharing FTP Server 2.0 PASS Overflow
exploit/windows/ftp/easyftp_cwd_fixretEasyFTP Server CWD Command Stack Buffer Overflow
exploit/windows/ftp/easyftp_list_fixretEasyFTP Server LIST Command Stack Buffer Overflow
exploit/windows/ftp/easyftp_mkd_fixretEasyFTP Server MKD Command Stack Buffer Overflow
exploit/windows/ftp/filecopa_list_overflowFileCopa FTP Server Pre 18 Jul Version
exploit/windows/ftp/filewrangler_list_replyFileWrangler 5.30 Stack Buffer Overflow
exploit/windows/ftp/freefloatftp_userFree Float FTP Server USER Command Buffer Overflow
exploit/windows/ftp/freefloatftp_wbemFreeFloat FTP Server Arbitrary File Upload
exploit/windows/ftp/freeftpd_passfreeFTPd PASS Command Buffer Overflow
exploit/windows/ftp/freeftpd_userfreeFTPd 1.0 Username Overflow
exploit/windows/ftp/ftpgetter_pwd_replyFTPGetter Standard v3.55.0.05 Stack Buffer Overflow (PWD)
exploit/windows/ftp/ftppad_list_replyFTPPad 1.2.0 Stack Buffer Overflow
exploit/windows/ftp/ftpshell51_pwd_replyFTPShell 5.1 Stack Buffer Overflow
exploit/windows/ftp/ftpshell_cli_bofFTPShell client 6.70 (Enterprise edition) Stack Buffer Overflow
exploit/windows/ftp/ftpsynch_list_replyFTP Synchronizer Professional 4.0.73.274 Stack Buffer Overflow
exploit/windows/ftp/gekkomgr_list_replyGekko Manager FTP Client Stack Buffer Overflow
exploit/windows/ftp/globalscapeftp_inputGlobalSCAPE Secure FTP Server Input Overflow
exploit/windows/ftp/goldenftp_pass_bofGoldenFTP PASS Stack Buffer Overflow
exploit/windows/ftp/httpdx_tolog_formatHTTPDX tolog() Function Format String Vulnerability
exploit/windows/ftp/kmftp_utility_cwdKonica Minolta FTP Utility 1.00 Post Auth CWD Command SEH Overflow
exploit/windows/ftp/labf_nfsaxeLabF nfsAxe 3.7 FTP Client Stack Buffer Overflow
exploit/windows/ftp/leapftp_list_replyLeapFTP 3.0.1 Stack Buffer Overflow
exploit/windows/ftp/leapftp_pasv_replyLeapWare LeapFTP v2.7.3.600 PASV Reply Client Overflow
exploit/windows/ftp/ms09_053_ftpd_nlstMS09-053 Microsoft IIS FTP Server NLST Response Overflow
exploit/windows/ftp/netterm_netftpd_userNetTerm NetFTPD USER Buffer Overflow
exploit/windows/ftp/odin_list_replyOdin Secure FTP 4.1 Stack Buffer Overflow (LIST)
exploit/windows/ftp/open_ftpd_wbemOpen-FTPD 1.2 Arbitrary File Upload
exploit/windows/ftp/oracle9i_xdb_ftp_passOracle 9i XDB FTP PASS Overflow (win32)
exploit/windows/ftp/oracle9i_xdb_ftp_unlockOracle 9i XDB FTP UNLOCK Overflow (win32)
exploit/windows/ftp/pcman_putPCMAN FTP Server Buffer Overflow - PUT Command
exploit/windows/ftp/pcman_storPCMAN FTP Server Post-Authentication STOR Command Stack Buffer Overflow
exploit/windows/ftp/proftp_bannerProFTP 2.9 Banner Remote Buffer Overflow
exploit/windows/ftp/quickshare_traversal_writeQuickShare File Server 1.2.1 Directory Traversal Vulnerability
exploit/windows/ftp/ricoh_dl_bofRicoh DC DL-10 SR10 FTP USER Command Buffer Overflow
exploit/windows/ftp/sami_ftpd_listSami FTP Server LIST Command Buffer Overflow
exploit/windows/ftp/sami_ftpd_userKarjaSoft Sami FTP Server v2.0.2 USER Overflow
exploit/windows/ftp/sasser_ftpd_portSasser Worm avserve FTP PORT Buffer Overflow
exploit/windows/ftp/scriptftp_listScriptFTP LIST Remote Buffer Overflow
exploit/windows/ftp/seagull_list_replySeagull FTP v3.3 Build 409 Stack Buffer Overflow
exploit/windows/ftp/servu_chmodServ-U FTP Server Buffer Overflow
exploit/windows/ftp/servu_mdtmServ-U FTPD MDTM Overflow
exploit/windows/ftp/slimftpd_list_concatSlimFTPd LIST Concatenation Overflow
exploit/windows/ftp/trellian_client_pasvTrellian FTP Client 3.01 PASV Remote Buffer Overflow
exploit/windows/ftp/turboftp_portTurbo FTP Server 1.30.823 PORT Overflow
exploit/windows/ftp/vermillion_ftpd_portVermillion FTP Daemon PORT Command Memory Corruption
exploit/windows/ftp/warftpd_165_passWar-FTPD 1.65 Password Overflow
exploit/windows/ftp/warftpd_165_userWar-FTPD 1.65 Username Overflow
exploit/windows/ftp/wftpd_sizeTexas Imperial Software WFTPD 3.23 SIZE Overflow
exploit/windows/ftp/winaxe_server_readyWinaXe 7.7 FTP Client Remote Buffer Overflow
exploit/windows/ftp/wing_ftp_admin_execWing FTP Server Authenticated Command Execution
exploit/windows/ftp/wsftp_server_503_mkdWS-FTP Server 5.03 MKD Overflow
exploit/windows/ftp/wsftp_server_505_xmd5Ipswitch WS_FTP Server 5.05 XMD5 Overflow
exploit/windows/ftp/xftp_client_pwdXftp FTP Client 3.0 PWD Remote Buffer Overflow
exploit/windows/ftp/xlink_clientXlink FTP Client Buffer Overflow
exploit/windows/ftp/xlink_serverXlink FTP Server Buffer Overflow
exploit/windows/games/mohaa_getinfoMedal of Honor Allied Assault getinfo Stack Buffer Overflow
exploit/windows/games/racer_503beta5Racer v0.5.3 Beta 5 Buffer Overflow
exploit/windows/games/ut2004_secureUnreal Tournament 2004 "secure" Overflow (Win32)
exploit/windows/http/adobe_robohelper_authbypassAdobe RoboHelp Server 8 Arbitrary File Upload and Execute
exploit/windows/http/advantech_iview_networkservlet_cmd_injectAdvantech iView NetworkServlet Command Injection
exploit/windows/http/advantech_iview_unauth_rceAdvantech iView Unauthenticated Remote Code Execution
exploit/windows/http/altn_securitygatewayAlt-N SecurityGateway username Buffer Overflow
exploit/windows/http/altn_webadminAlt-N WebAdmin USER Buffer Overflow
exploit/windows/http/amlibweb_webquerydll_appAmlibweb NetOpacs webquery.dll Stack Buffer Overflow
exploit/windows/http/apache_activemq_traversal_uploadApache ActiveMQ 5.x-5.11.1 Directory Traversal Shell Upload
exploit/windows/http/apache_chunkedApache Win32 Chunked Encoding
exploit/windows/http/apache_modjk_overflowApache mod_jk 1.2.20 Buffer Overflow
exploit/windows/http/apache_mod_rewrite_ldapApache Module mod_rewrite LDAP Protocol Buffer Overflow
exploit/windows/http/apache_tika_jp2_jscriptApache Tika Header Command Injection
exploit/windows/http/avaya_ccr_imageupload_execAvaya IP Office Customer Call Reporter ImageUpload.ashx Remote Command Execution
exploit/windows/http/badblue_ext_overflowBadBlue 2.5 EXT.dll Buffer Overflow
exploit/windows/http/badblue_passthruBadBlue 2.72b PassThru Buffer Overflow
exploit/windows/http/bea_weblogic_jsessionidBEA WebLogic JSESSIONID Cookie Value Overflow
exploit/windows/http/bea_weblogic_post_bofOracle Weblogic Apache Connector POST Request Buffer Overflow
exploit/windows/http/bea_weblogic_transfer_encodingBEA Weblogic Transfer-Encoding Buffer Overflow
exploit/windows/http/belkin_bulldogBelkin Bulldog Plus Web Service Buffer Overflow
exploit/windows/http/ca_arcserve_rpc_authbypassCA Arcserve D2D GWT RPC Credential Information Disclosure
exploit/windows/http/ca_igateway_debugCA iTechnology iGateway Debug Mode Buffer Overflow
exploit/windows/http/ca_totaldefense_regeneratereportsCA Total Defense Suite reGenerateReports Stored Procedure SQL Injection
exploit/windows/http/cayin_xpost_sql_rceCayin xPost wayfinder_seqid SQLi to RCE
exploit/windows/http/cogent_datahub_commandCogent DataHub Command Injection
exploit/windows/http/cogent_datahub_request_headers_bofCogent DataHub HTTP Server Buffer Overflow
exploit/windows/http/coldfusion_fckeditorColdFusion 8.0.1 Arbitrary File Upload and Execute
exploit/windows/http/cyclope_ess_sqliCyclope Employee Surveillance Solution v6 SQL Injection
exploit/windows/http/desktopcentral_deserializationManageEngine Desktop Central Java Deserialization
exploit/windows/http/desktopcentral_file_uploadManageEngine Desktop Central AgentLogUpload Arbitrary File Upload
exploit/windows/http/desktopcentral_statusupdate_uploadManageEngine Desktop Central StatusUpdate Arbitrary File Upload
exploit/windows/http/diskboss_get_bofDiskBoss Enterprise GET Buffer Overflow
exploit/windows/http/disk_pulse_enterprise_bofDisk Pulse Enterprise Login Buffer Overflow
exploit/windows/http/disk_pulse_enterprise_getDisk Pulse Enterprise GET Buffer Overflow
exploit/windows/http/disksavvy_get_bofDiskSavvy Enterprise GET Buffer Overflow
exploit/windows/http/disksorter_bofDisk Sorter Enterprise GET Buffer Overflow
exploit/windows/http/dlink_central_wifimanager_rceD-Link Central WiFi Manager CWM(100) RCE
exploit/windows/http/dnn_cookie_deserialization_rceDotNetNuke Cookie Deserialization Remote Code Excecution
exploit/windows/http/dup_scout_enterprise_login_bofDup Scout Enterprise Login Buffer Overflow
exploit/windows/http/dupscts_bofDup Scout Enterprise GET Buffer Overflow
exploit/windows/http/easychatserver_sehEasy Chat Server User Registeration Buffer Overflow (SEH)
exploit/windows/http/easyfilesharing_postEasy File Sharing HTTP Server 7.2 POST Buffer Overflow
exploit/windows/http/easyfilesharing_sehEasy File Sharing HTTP Server 7.2 SEH Overflow
exploit/windows/http/easyftp_listEasyFTP Server list.html path Stack Buffer Overflow
exploit/windows/http/edirectory_hostNovell eDirectory NDS Server Host Header Overflow
exploit/windows/http/edirectory_imonitoreDirectory 8.7.3 iMonitor Remote Stack Buffer Overflow
exploit/windows/http/efs_easychatserver_usernameEFS Easy Chat Server Authentication Request Handling Buffer Overflow
exploit/windows/http/efs_fmws_userid_bofEasy File Management Web Server Stack Buffer Overflow
exploit/windows/http/ektron_xslt_execEktron 8.02 XSLT Transform Remote Code Execution
exploit/windows/http/ektron_xslt_exec_wsEktron 8.5, 8.7, 9.0 XSLT Transform Remote Code Execution
exploit/windows/http/ericom_access_now_bofEricom AccessNow Server Buffer Overflow
exploit/windows/http/exchange_chainedserializationbinder_denylist_typo_rceMicrosoft Exchange Server ChainedSerializationBinder Deny List Typo RCE
exploit/windows/http/exchange_chainedserializationbinder_rceMicrosoft Exchange Server ChainedSerializationBinder RCE
exploit/windows/http/exchange_ecp_dlp_policyMicrosoft Exchange Server DlpUtils AddTenantDlpPolicy RCE
exploit/windows/http/exchange_ecp_viewstateExchange Control Panel ViewState Deserialization
exploit/windows/http/exchange_proxylogon_rceMicrosoft Exchange ProxyLogon RCE
exploit/windows/http/exchange_proxynotshell_rceMicrosoft Exchange ProxyNotShell RCE
exploit/windows/http/exchange_proxyshell_rceMicrosoft Exchange ProxyShell RCE
exploit/windows/http/ezserver_httpEZHomeTech EzServer Stack Buffer Overflow Vulnerability
exploit/windows/http/fdm_auth_headerFree Download Manager Remote Control Server Buffer Overflow
exploit/windows/http/file_sharing_wizard_sehFile Sharing Wizard - POST SEH Overflow
exploit/windows/http/flexdotnetcms_upload_execFlexDotnetCMS Arbitrary ASP File Upload
exploit/windows/http/fortilogger_arbitrary_fileuploadFortiLogger Arbitrary File Upload Exploit
exploit/windows/http/generic_http_dll_injectionGeneric Web Application DLL Injection
exploit/windows/http/geutebrueck_gcore_x64_rce_boGeutebrueck GCore - GCoreServer.exe Buffer Overflow RCE
exploit/windows/http/git_lfs_rceGit Remote Code Execution via git-lfs (CVE-2020-27955)
exploit/windows/http/gitstack_rceGitStack Unsanitized Argument RCE
exploit/windows/http/hp_autopass_license_traversalHP AutoPass License Server File Upload
exploit/windows/http/hpe_sim_76_amf_deserializationHPE Systems Insight Manager AMF Deserialization RCE
exploit/windows/http/hp_imc_bims_uploadHP Intelligent Management Center BIMS UploadServlet Directory Traversal
exploit/windows/http/hp_imc_java_deserializeHP Intelligent Management Java Deserialization RCE
exploit/windows/http/hp_imc_mibfileuploadHP Intelligent Management Center Arbitrary File Upload
exploit/windows/http/hp_loadrunner_copyfiletoserverHP LoadRunner EmulationAdmin Web Service Directory Traversal
exploit/windows/http/hp_mpa_job_acctHP Managed Printing Administration jobAcct Remote Command Execution
exploit/windows/http/hp_nnm_getnnmdata_hostnameHP OpenView Network Node Manager getnnmdata.exe (Hostname) CGI Buffer Overflow
exploit/windows/http/hp_nnm_getnnmdata_icountHP OpenView Network Node Manager getnnmdata.exe (ICount) CGI Buffer Overflow
exploit/windows/http/hp_nnm_getnnmdata_maxageHP OpenView Network Node Manager getnnmdata.exe (MaxAge) CGI Buffer Overflow
exploit/windows/http/hp_nnm_nnmrptconfig_nameparamsHP OpenView NNM nnmRptConfig nameParams Buffer Overflow
exploit/windows/http/hp_nnm_nnmrptconfig_schdparamsHP OpenView NNM nnmRptConfig.exe schdParams Buffer Overflow
exploit/windows/http/hp_nnm_openview5HP OpenView Network Node Manager OpenView5.exe CGI Buffer Overflow
exploit/windows/http/hp_nnm_ovalarm_langHP OpenView Network Node Manager ovalarm.exe CGI Buffer Overflow
exploit/windows/http/hp_nnm_ovasHP OpenView NNM 7.53, 7.51 OVAS.EXE Pre-Authentication Stack Buffer Overflow
exploit/windows/http/hp_nnm_ovbuildpath_textfileHP OpenView Network Node Manager ov.dll _OVBuildPath Buffer Overflow
exploit/windows/http/hp_nnm_ovwebhelpHP OpenView Network Node Manager OvWebHelp.exe CGI Buffer Overflow
exploit/windows/http/hp_nnm_ovwebsnmpsrv_mainHP OpenView Network Node Manager ovwebsnmpsrv.exe main Buffer Overflow
exploit/windows/http/hp_nnm_ovwebsnmpsrv_ovutilHP OpenView Network Node Manager ovwebsnmpsrv.exe ovutil Buffer Overflow
exploit/windows/http/hp_nnm_ovwebsnmpsrv_uroHP OpenView Network Node Manager ovwebsnmpsrv.exe Unrecognized Option Buffer Overflow
exploit/windows/http/hp_nnm_snmpHP OpenView Network Node Manager Snmp.exe CGI Buffer Overflow
exploit/windows/http/hp_nnm_snmpviewer_actappHP OpenView Network Node Manager snmpviewer.exe Buffer Overflow
exploit/windows/http/hp_nnm_toolbar_01HP OpenView Network Node Manager Toolbar.exe CGI Buffer Overflow
exploit/windows/http/hp_nnm_toolbar_02HP OpenView Network Node Manager Toolbar.exe CGI Cookie Handling Buffer Overflow
exploit/windows/http/hp_nnm_webappmon_execvpHP OpenView Network Node Manager execvp_nc Buffer Overflow
exploit/windows/http/hp_nnm_webappmon_ovjavalocaleHP NNM CGI webappmon.exe OvJavaLocale Buffer Overflow
exploit/windows/http/hp_openview_insight_backdoorHP OpenView Performance Insight Server Backdoor Account Code Execution
exploit/windows/http/hp_pcm_snac_update_certificatesHP ProCurve Manager SNAC UpdateCertificatesServlet File Upload
exploit/windows/http/hp_pcm_snac_update_domainHP ProCurve Manager SNAC UpdateDomainControllerServlet File Upload
exploit/windows/http/hp_power_manager_filenameHP Power Manager 'formExportDataLogs' Buffer Overflow
exploit/windows/http/hp_power_manager_loginHewlett-Packard Power Manager Administration Buffer Overflow
exploit/windows/http/hp_sitescope_dns_toolHP SiteScope DNS Tool Command Injection
exploit/windows/http/hp_sitescope_runomagentcommandHP SiteScope Remote Code Execution
exploit/windows/http/httpdx_handlepeerHTTPDX h_handlepeer() Function Buffer Overflow
exploit/windows/http/httpdx_tolog_formatHTTPDX tolog() Function Format String Vulnerability
exploit/windows/http/ia_webmailIA WebMail 3.x Buffer Overflow
exploit/windows/http/ibm_tivoli_endpoint_bofIBM Tivoli Endpoint Manager POST Query Buffer Overflow
exploit/windows/http/ibm_tpmfosd_overflowIBM TPM for OS Deployment 5.1.0.x rembo.exe Buffer Overflow
exploit/windows/http/ibm_tsm_cad_headerIBM Tivoli Storage Manager Express CAD Service Buffer Overflow
exploit/windows/http/icecast_headerIcecast Header Overwrite
exploit/windows/http/integard_password_bofRace River Integard Home/Pro LoginAdmin Password Stack Buffer Overflow
exploit/windows/http/intersystems_cacheInterSystems Cache UtilConfigHome.csp Argument Buffer Overflow
exploit/windows/http/intrasrv_bofIntrasrv 1.0 Buffer Overflow
exploit/windows/http/ipswitch_wug_maincfgretIpswitch WhatsUp Gold 8.03 Buffer Overflow
exploit/windows/http/jira_collector_traversalJIRA Issues Collector Directory Traversal
exploit/windows/http/kaseya_uploaderKaseya VSA uploader.aspx Arbitrary File Upload
exploit/windows/http/kaseya_uploadimage_file_uploadKaseya uploadImage Arbitrary File Upload
exploit/windows/http/kentico_staging_syncserverKentico CMS Staging SyncServer Unserialize Remote Command Execution
exploit/windows/http/kolibri_httpKolibri HTTP Server HEAD Buffer Overflow
exploit/windows/http/landesk_thinkmanagement_upload_aspLANDesk Lenovo ThinkManagement Console Remote Command Execution
exploit/windows/http/lexmark_markvision_gfd_uploadLexmark MarkVision Enterprise Arbitrary File Upload
exploit/windows/http/mailenable_auth_headerMailEnable Authorization Header Buffer Overflow
exploit/windows/http/manageengine_adaudit_plus_cve_2022_28219ManageEngine ADAudit Plus CVE-2022-28219
exploit/windows/http/manageengine_adselfservice_plus_cve_2021_40539ManageEngine ADSelfService Plus CVE-2021-40539
exploit/windows/http/manageengine_adselfservice_plus_cve_2022_28810ManageEngine ADSelfService Plus Custom Script Execution
exploit/windows/http/manageengine_adshacluster_rceManage Engine Exchange Reporter Plus Unauthenticated RCE
exploit/windows/http/manageengine_appmanager_execManageEngine Applications Manager Remote Code Execution
exploit/windows/http/manageengine_apps_mngrManageEngine Applications Manager Authenticated Code Execution
exploit/windows/http/manageengine_connectionid_writeManageEngine Desktop Central 9 FileUploadServlet ConnectionId Vulnerability
exploit/windows/http/manage_engine_opmanager_rceManageEngine OpManager Remote Code Execution
exploit/windows/http/manageengine_servicedesk_plus_cve_2021_44077ManageEngine ServiceDesk Plus CVE-2021-44077
exploit/windows/http/maxdb_webdbm_databaseMaxDB WebDBM Database Parameter Overflow
exploit/windows/http/maxdb_webdbm_get_overflowMaxDB WebDBM GET Buffer Overflow
exploit/windows/http/mcafee_epolicy_sourceMcAfee ePolicy Orchestrator / ProtectionPilot Overflow
exploit/windows/http/mdaemon_worldclient_form2rawMDaemon WorldClient form2raw.cgi Stack Buffer Overflow
exploit/windows/http/minishare_get_overflowMinishare 1.4.1 Buffer Overflow
exploit/windows/http/miniweb_upload_wbemMiniWeb (Build 300) Arbitrary File Upload
exploit/windows/http/navicopa_get_overflowNaviCOPA 2.0.1 URL Handling Buffer Overflow
exploit/windows/http/netdecision_http_bofNetDecision 4.5.1 HTTP Server Buffer Overflow
exploit/windows/http/netgear_nms_rceNETGEAR ProSafe Network Management System 300 Arbitrary File Upload
exploit/windows/http/netmotion_mobility_mvcutil_deserializationNetMotion Mobility Server MvcUtil Java Deserialization
exploit/windows/http/novell_imanager_uploadNovell iManager getMultiPartParameters Arbitrary File Upload
exploit/windows/http/novell_mdm_lfiNovell Zenworks Mobile Managment MDM.php Local File Inclusion Vulnerability
exploit/windows/http/novell_messenger_acceptlangNovell Messenger Server 2.0 Accept-Language Overflow
exploit/windows/http/nowsmsNow SMS/MMS Gateway Buffer Overflow
exploit/windows/http/nscp_authenticated_rceNSClient++ 0.5.2.35 - ExternalScripts Authenticated Remote Code Execution
exploit/windows/http/oats_weblogic_consoleOracle Application Testing Suite WebLogic Server Administration Console War Deployment
exploit/windows/http/octopusdeploy_deployOctopus Deploy Authenticated Code Execution
exploit/windows/http/oracle9i_xdb_passOracle 9i XDB HTTP PASS Overflow (win32)
exploit/windows/http/oracle_beehive_evaluationOracle BeeHive 2 voice-servlet processEvaluation() Vulnerability
exploit/windows/http/oracle_beehive_prepareaudiotoplayOracle BeeHive 2 voice-servlet prepareAudioToPlay() Arbitrary File Upload
exploit/windows/http/oracle_btm_writetofileOracle Business Transaction Management FlashTunnelService Remote Code Execution
exploit/windows/http/oracle_endeca_execOracle Endeca Server Remote Command Execution
exploit/windows/http/oracle_event_processing_uploadOracle Event Processing FileUploadServlet Arbitrary File Upload
exploit/windows/http/osb_uname_jlistOracle Secure Backup Authentication Bypass/Command Injection Vulnerability
exploit/windows/http/peercast_urlPeerCast URL Handling Buffer Overflow
exploit/windows/http/php_apache_request_headers_bofPHP apache_request_headers Function Buffer Overflow
exploit/windows/http/plesk_mylittleadmin_viewstatePlesk/myLittleAdmin ViewState .NET Deserialization
exploit/windows/http/plex_unpickle_dict_rcePlex Unpickle Dict Windows RCE
exploit/windows/http/privatewire_gatewayPrivate Wire Gateway Buffer Overflow
exploit/windows/http/prtg_authenticated_rcePRTG Network Monitor Authenticated RCE
exploit/windows/http/psoproxy91_overflowPSO Proxy v0.91 Stack Buffer Overflow
exploit/windows/http/rabidhamster_r4_logRabidHamster R4 Log Entry sprintf() Buffer Overflow
exploit/windows/http/rejetto_hfs_execRejetto HttpFileServer Remote Command Execution
exploit/windows/http/sambar6_search_resultsSambar 6 Search Results Buffer Overflow
exploit/windows/http/sap_configservlet_exec_noauthSAP ConfigServlet Remote Code Execution
exploit/windows/http/sapdb_webtoolsSAP DB 7.4 WebTools Buffer Overflow
exploit/windows/http/sap_host_control_cmd_execSAP NetWeaver HostControl Command Injection
exploit/windows/http/savant_31_overflowSavant 3.1 Web Server Overflow
exploit/windows/http/sepm_auth_bypass_rceSymantec Endpoint Protection Manager Authentication Bypass and Code Execution
exploit/windows/http/serviio_checkstreamurl_cmd_execServiio Media Server checkStreamUrl Command Execution
exploit/windows/http/servu_session_cookieRhinosoft Serv-U Session Cookie Buffer Overflow
exploit/windows/http/sharepoint_data_deserializationSharePoint DataSet / DataTable Deserialization
exploit/windows/http/sharepoint_ssi_viewstateMicrosoft SharePoint Server-Side Include and ViewState RCE
exploit/windows/http/sharepoint_unsafe_controlMicrosoft SharePoint Unsafe Control and ViewState RCE
exploit/windows/http/sharepoint_workflows_xomlSharePoint Workflows XOML Injection
exploit/windows/http/shoutcast_formatSHOUTcast DNAS/win32 1.9.4 File Request Format String Overflow
exploit/windows/http/shttpd_postSHTTPD URI-Encoded POST Request Overflow
exploit/windows/http/sitecore_xp_cve_2021_42237Sitecore Experience Platform (XP) PreAuth Deserialization RCE
exploit/windows/http/solarwinds_fsm_userloginSolarwinds Firewall Security Manager 6.6.5 Client Session Handling Vulnerability
exploit/windows/http/solarwinds_storage_manager_sqlSolarwinds Storage Manager 5.1.0 SQL Injection
exploit/windows/http/sonicwall_scrutinizer_sqliDell SonicWALL (Plixer) Scrutinizer 9 SQL Injection
exploit/windows/http/ssrs_navcorrector_viewstateSQL Server Reporting Services (SSRS) ViewState Deserialization
exploit/windows/http/steamcast_useragentStreamcast HTTP User-Agent Buffer Overflow
exploit/windows/http/sws_connection_bofSimple Web Server Connection Header Buffer Overflow
exploit/windows/http/sybase_easerverSybase EAServer 5.2 Remote Stack Buffer Overflow
exploit/windows/http/syncbreeze_bofSync Breeze Enterprise GET Buffer Overflow
exploit/windows/http/sysax_create_folderSysax Multi Server 5.64 Create Folder Buffer Overflow
exploit/windows/http/telerik_rau_deserializationTelerik UI ASP.NET AJAX RadAsyncUpload Deserialization
exploit/windows/http/tomcat_cgi_cmdlineargsApache Tomcat CGIServlet enableCmdLineArguments Vulnerability
exploit/windows/http/trackercam_phparg_overflowTrackerCam PHP Argument Buffer Overflow
exploit/windows/http/trackit_file_uploadNumara / BMC Track-It! FileStorageService Arbitrary File Upload
exploit/windows/http/trendmicro_officescanTrend Micro OfficeScan Remote Stack Buffer Overflow
exploit/windows/http/trendmicro_officescan_widget_execTrend Micro OfficeScan Remote Code Execution
exploit/windows/http/ultraminihttp_bofUltra Mini HTTPD Stack Buffer Overflow
exploit/windows/http/umbraco_upload_aspxUmbraco CMS Remote Command Execution
exploit/windows/http/vmware_vcenter_chargeback_uploadVMware vCenter Chargeback Manager ImageUploadServlet Arbitrary File Upload
exploit/windows/http/vxsrchs_bofVX Search Enterprise GET Buffer Overflow
exploit/windows/http/webster_httpWebster HTTP Server GET Buffer Overflow
exploit/windows/http/xampp_webdav_upload_phpXAMPP WebDAV PHP Upload
exploit/windows/http/xitami_if_mod_sinceXitami 2.5c2 Web Server If-Modified-Since Overflow
exploit/windows/http/zentao_pro_rceZenTao Pro 8.8.2 Remote Code Execution
exploit/windows/http/zenworks_assetmgmt_uploadservletNovell ZENworks Asset Management Remote Execution
exploit/windows/http/zenworks_uploadservletNovell ZENworks Configuration Management Remote Execution
exploit/windows/http/zoho_password_manager_pro_xml_rpc_rceZoho Password Manager Pro XML-RPC Java Deserialization
exploit/windows/ibm/ibm_was_dmgr_java_deserialization_rceIBM Websphere Application Server Network Deployment Untrusted Data Deserialization Remote Code Execution
exploit/windows/iis/iis_webdav_scstoragepathfromurlMicrosoft IIS WebDav ScStoragePathFromUrl Overflow
exploit/windows/iis/iis_webdav_upload_aspMicrosoft IIS WebDAV Write Access Code Execution
exploit/windows/iis/ms01_023_printerMS01-023 Microsoft IIS 5.0 Printer Host Header Overflow
exploit/windows/iis/ms01_026_dbldecodeMS01-026 Microsoft IIS/PWS CGI Filename Double Decode Command Execution
exploit/windows/iis/ms01_033_idqMS01-033 Microsoft IIS 5.0 IDQ Path Overflow
exploit/windows/iis/ms02_018_htrMS02-018 Microsoft IIS 4.0 .HTR Path Overflow
exploit/windows/iis/ms02_065_msadcMS02-065 Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow
exploit/windows/iis/ms03_007_ntdll_webdavMS03-007 Microsoft IIS 5.0 WebDAV ntdll.dll Path Overflow
exploit/windows/iis/msadcMS99-025 Microsoft IIS MDAC msadcs.dll RDS Arbitrary Remote Command Execution
exploit/windows/imap/eudora_listQualcomm WorldMail 3.0 IMAPD LIST Buffer Overflow
exploit/windows/imap/imail_deleteIMail IMAP4D Delete Overflow
exploit/windows/imap/ipswitch_searchIpswitch IMail IMAP SEARCH Buffer Overflow
exploit/windows/imap/mailenable_loginMailEnable IMAPD (2.34/2.35) Login Request Buffer Overflow
exploit/windows/imap/mailenable_statusMailEnable IMAPD (1.54) STATUS Request Buffer Overflow
exploit/windows/imap/mailenable_w3c_selectMailEnable IMAPD W3C Logging Buffer Overflow
exploit/windows/imap/mdaemon_cram_md5Mdaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow
exploit/windows/imap/mdaemon_fetchMDaemon 9.6.4 IMAPD FETCH Buffer Overflow
exploit/windows/imap/mercur_imap_select_overflowMercur v5.0 IMAP SP3 SELECT Buffer Overflow
exploit/windows/imap/mercur_loginMercur Messaging 2005 IMAP Login Buffer Overflow
exploit/windows/imap/mercury_loginMercury/32 4.01 IMAP LOGIN SEH Buffer Overflow
exploit/windows/imap/mercury_renameMercury/32 v4.01a IMAP RENAME Buffer Overflow
exploit/windows/imap/novell_netmail_appendNovell NetMail IMAP APPEND Buffer Overflow
exploit/windows/imap/novell_netmail_authNovell NetMail IMAP AUTHENTICATE Buffer Overflow
exploit/windows/imap/novell_netmail_statusNovell NetMail IMAP STATUS Buffer Overflow
exploit/windows/imap/novell_netmail_subscribeNovell NetMail IMAP SUBSCRIBE Buffer Overflow
exploit/windows/isapi/ms00_094_pbserverMS00-094 Microsoft IIS Phone Book Service Overflow
exploit/windows/isapi/ms03_022_nsiislog_postMS03-022 Microsoft IIS ISAPI nsiislog.dll ISAPI POST Overflow
exploit/windows/isapi/ms03_051_fp30reg_chunkedMS03-051 Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow
exploit/windows/isapi/rsa_webagent_redirectMicrosoft IIS ISAPI RSA WebAgent Redirect Overflow
exploit/windows/isapi/w3who_queryMicrosoft IIS ISAPI w3who.dll Query String Overflow
exploit/windows/ldap/imail_thcIMail LDAP Service Buffer Overflow
exploit/windows/ldap/pgp_keyserver7Network Associates PGP KeyServer 7 LDAP Buffer Overflow
exploit/windows/license/calicclnt_getconfigComputer Associates License Client GETCONFIG Overflow
exploit/windows/license/calicserv_getconfigComputer Associates License Server GETCONFIG Overflow
exploit/windows/license/flexnet_lmgrd_bofFlexNet License Server Manager lmgrd Buffer Overflow
exploit/windows/license/sentinel_lm7_udpSentinelLM UDP Buffer Overflow
exploit/windows/local/adobe_sandbox_adobecollabsyncAdobeCollabSync Buffer Overflow Adobe Reader X Sandbox Bypass
exploit/windows/local/agnitum_outpost_acsAgnitum Outpost Internet Security Local Privilege Escalation
exploit/windows/local/alpc_taskschedulerMicrosoft Windows ALPC Task Scheduler Local Privilege Elevation
exploit/windows/local/always_install_elevatedWindows AlwaysInstallElevated MSI
exploit/windows/local/anyconnect_lpeCisco AnyConnect Privilege Escalations (CVE-2020-3153 and CVE-2020-3433)
exploit/windows/local/applocker_bypassAppLocker Execution Prevention Bypass
exploit/windows/local/appxsvc_hard_link_privescAppXSvc Hard Link Privilege Escalation
exploit/windows/local/askWindows Escalate UAC Execute RunAs
exploit/windows/local/bits_ntlm_token_impersonationSYSTEM token impersonation through NTLM bits authentication on missing WinRM Service.
exploit/windows/local/bthpanMS14-062 Microsoft Bluetooth Personal Area Networking (BthPan.sys) Privilege Escalation
exploit/windows/local/bypassuac_comhijackWindows Escalate UAC Protection Bypass (Via COM Handler Hijack)
exploit/windows/local/bypassuac_dotnet_profilerWindows Escalate UAC Protection Bypass (Via dot net profiler)
exploit/windows/local/bypassuac_eventvwrWindows Escalate UAC Protection Bypass (Via Eventvwr Registry Key)
exploit/windows/local/bypassuac_fodhelperWindows UAC Protection Bypass (Via FodHelper Registry Key)
exploit/windows/local/bypassuacWindows Escalate UAC Protection Bypass
exploit/windows/local/bypassuac_injectionWindows Escalate UAC Protection Bypass (In Memory Injection)
exploit/windows/local/bypassuac_injection_winsxsWindows Escalate UAC Protection Bypass (In Memory Injection) abusing WinSXS
exploit/windows/local/bypassuac_sdcltWindows Escalate UAC Protection Bypass (Via Shell Open Registry Key)
exploit/windows/local/bypassuac_silentcleanupWindows Escalate UAC Protection Bypass (Via SilentCleanup)
exploit/windows/local/bypassuac_sluihijackWindows UAC Protection Bypass (Via Slui File Handler Hijack)
exploit/windows/local/bypassuac_vbsWindows Escalate UAC Protection Bypass (ScriptHost Vulnerability)
exploit/windows/local/bypassuac_windows_store_filesysWindows 10 UAC Protection Bypass Via Windows Store (WSReset.exe)
exploit/windows/local/bypassuac_windows_store_regWindows 10 UAC Protection Bypass Via Windows Store (WSReset.exe) and Registry
exploit/windows/local/canon_driver_privescCanon Driver Privilege Escalation
exploit/windows/local/capcom_sys_execWindows Capcom.sys Kernel Execution Exploit (x64 only)
exploit/windows/local/comahawkMicrosoft UPnP Local Privilege Elevation Vulnerability
exploit/windows/local/current_user_psexecPsExec via Current User Token
exploit/windows/local/cve_2017_8464_lnk_lpeLNK Code Execution Vulnerability
exploit/windows/local/cve_2018_8453_win32k_priv_escWindows NtUserSetWindowFNID Win32k User Callback
exploit/windows/local/cve_2019_1458_wizardopiumMicrosoft Windows Uninitialized Variable Local Privilege Elevation
exploit/windows/local/cve_2020_0668_service_tracingService Tracing Privilege Elevation Vulnerability
exploit/windows/local/cve_2020_0787_bits_arbitrary_file_moveBackground Intelligent Transfer Service Arbitrary File Move Privilege Elevation Vulnerability
exploit/windows/local/cve_2020_0796_smbghostSMBv3 Compression Buffer Overflow
exploit/windows/local/cve_2020_1048_printerdemonMicrosoft Spooler Local Privilege Elevation Vulnerability
exploit/windows/local/cve_2020_1054_drawiconex_lpeMicrosoft Windows DrawIconEx OOB Write Local Privilege Elevation
exploit/windows/local/cve_2020_1313_system_orchestratorWindows Update Orchestrator unchecked ScheduleWork call
exploit/windows/local/cve_2020_1337_printerdemonMicrosoft Spooler Local Privilege Elevation Vulnerability
exploit/windows/local/cve_2020_17136CVE-2020-1170 Cloud Filter Arbitrary File Creation EOP
exploit/windows/local/cve_2021_1732_win32kWin32k ConsoleControl Offset Confusion
exploit/windows/local/cve_2021_21551_dbutil_memmoveDell DBUtil_2_3.sys IOCTL memmove
exploit/windows/local/cve_2021_40449Win32k NtGdiResetDC Use After Free Local Privilege Elevation
exploit/windows/local/cve_2022_21882_win32kWin32k ConsoleControl Offset Confusion
exploit/windows/local/cve_2022_21999_spoolfool_privescCVE-2022-21999 SpoolFool Privesc
exploit/windows/local/cve_2022_26904_superprofileUser Profile Arbitrary Junction Creation Local Privilege Elevation
exploit/windows/local/dnsadmin_serverlevelplugindllDnsAdmin ServerLevelPluginDll Feature Abuse Privilege Escalation
exploit/windows/local/docker_credential_wincredDocker-Credential-Wincred.exe Privilege Escalation
exploit/windows/local/druva_insync_insynccphwnet64_rcp_type_5_priv_escDruva inSync inSyncCPHwnet64.exe RPC Type 5 Privilege Escalation
exploit/windows/local/gog_galaxyclientservice_privescGOG GalaxyClientService Privilege Escalation
exploit/windows/local/ikeext_serviceIKE and AuthIP IPsec Keyring Modules Service (IKEEXT) Missing DLL
exploit/windows/local/ipass_launch_appiPass Mobile Client Service Privilege Escalation
exploit/windows/local/lenovo_systemupdateLenovo System Update Privilege Escalation
exploit/windows/local/lexmark_driver_privescLexmark Driver Privilege Escalation
exploit/windows/local/microfocus_operations_privescMicro Focus Operations Bridge Manager / Reporter Local Privilege Escalation
exploit/windows/local/mov_ssMicrosoft Windows POP/MOV SS Local Privilege Elevation Vulnerability
exploit/windows/local/mqac_writeMQAC.sys Arbitrary Write Privilege Escalation
exploit/windows/local/ms10_015_kitrap0dWindows SYSTEM Escalation via KiTrap0D
exploit/windows/local/ms10_092_schelevatorWindows Escalate Task Scheduler XML Privilege Escalation
exploit/windows/local/ms11_080_afdjoinleafMS11-080 AfdJoinLeaf Privilege Escalation
exploit/windows/local/ms13_005_hwnd_broadcastMS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation
exploit/windows/local/ms13_053_schlampereiWindows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei)
exploit/windows/local/ms13_081_track_popup_menuWindows TrackPopupMenuEx Win32k NULL Page
exploit/windows/local/ms13_097_ie_registry_symlinkMS13-097 Registry Symlink IE Sandbox Escape
exploit/windows/local/ms14_009_ie_dfsvcMS14-009 .NET Deployment Service IE Sandbox Escape
exploit/windows/local/ms14_058_track_popup_menuWindows TrackPopupMenu Win32k NULL Pointer Dereference
exploit/windows/local/ms14_070_tcpip_ioctlMS14-070 Windows tcpip!SetAddrOptions NULL Pointer Dereference
exploit/windows/local/ms15_004_tswbproxyMS15-004 Microsoft Remote Desktop Services Web Proxy IE Sandbox Escape
exploit/windows/local/ms15_051_client_copy_imageWindows ClientCopyImage Win32k Exploit
exploit/windows/local/ms15_078_atmfd_bofMS15-078 Microsoft Windows Font Driver Buffer Overflow
exploit/windows/local/ms16_014_wmi_recv_notifWindows WMI Receive Notification Exploit
exploit/windows/local/ms16_016_webdavMS16-016 mrxdav.sys WebDav Local Privilege Escalation
exploit/windows/local/ms16_032_secondary_logon_handle_privescMS16-032 Secondary Logon Handle Privilege Escalation
exploit/windows/local/ms16_075_reflectionWindows Net-NTLMv2 Reflection DCOM/RPC
exploit/windows/local/ms16_075_reflection_juicyWindows Net-NTLMv2 Reflection DCOM/RPC (Juicy)
exploit/windows/local/ms18_8120_win32k_privescWindows SetImeInfoEx Win32k NULL Pointer Dereference
exploit/windows/local/ms_ndproxyMS14-002 Microsoft Windows ndproxy.sys Local Privilege Escalation
exploit/windows/local/novell_client_nicmNovell Client 2 SP3 nicm.sys Local Privilege Escalation
exploit/windows/local/novell_client_nwfsNovell Client 4.91 SP4 nwfs.sys Local Privilege Escalation
exploit/windows/local/nscp_peNSClient++ 0.5.2.35 - Privilege escalation
exploit/windows/local/ntapphelpcachecontrolMS15-001 Microsoft Windows NtApphelpCacheControl Improper Authorization Check
exploit/windows/local/ntusermndragoverMicrosoft Windows NtUserMNDragOver Local Privilege Elevation
exploit/windows/local/nvidia_nvsvcNvidia (nvsvc) Display Driver Service Local Privilege Escalation
exploit/windows/local/panda_pseventsPanda Security PSEvents Privilege Escalation
exploit/windows/local/payload_injectWindows Manage Memory Payload Injection
exploit/windows/local/persistenceWindows Persistent Registry Startup Payload Installer
exploit/windows/local/persistence_image_exec_optionsWindows Silent Process Exit Persistence
exploit/windows/local/persistence_serviceWindows Persistent Service Installer
exploit/windows/local/plantronics_hub_spokesupdateservice_privescPlantronics Hub SpokesUpdateService Privilege Escalation
exploit/windows/local/powershell_cmd_upgradeWindows Command Shell Upgrade (Powershell)
exploit/windows/local/powershell_remotingPowershell Remoting Remote Command Execution
exploit/windows/local/ppr_flatten_recWindows EPATHOBJ::pprFlattenRec Local Privilege Escalation
exploit/windows/local/ps_persistPowershell Payload Execution
exploit/windows/local/ps_wmi_execAuthenticated WMI Exec via Powershell
exploit/windows/local/pxeexploitPXE Exploit Server
exploit/windows/local/razer_zwopenprocessRazer Synapse rzpnk.sys ZwOpenProcess
exploit/windows/local/registry_persistenceWindows Registry Only Persistence
exploit/windows/local/ricoh_driver_privescRicoh Driver Privilege Escalation
exploit/windows/local/run_asWindows Run Command As User
exploit/windows/local/s4u_persistenceWindows Manage User Level Persistent Payload Installer
exploit/windows/local/service_permissionsWindows Escalate Service Permissions Local Privilege Escalation
exploit/windows/local/srclient_dll_hijackingWindows Server 2012 SrClient DLL hijacking
exploit/windows/local/tokenmagicWindows Privilege Escalation via TokenMagic (UAC Bypass)
exploit/windows/local/unquoted_service_pathWindows Unquoted Service Path Privilege Escalation
exploit/windows/local/virtual_box_guest_additionsVirtualBox Guest Additions VBoxGuest.sys Privilege Escalation
exploit/windows/local/virtual_box_opengl_escapeVirtualBox 3D Acceleration Virtual Machine Escape
exploit/windows/local/vss_persistencePersistent Payload in Windows Volume Shadow Copy
exploit/windows/local/webexecWebEx Local Service Permissions Exploit
exploit/windows/local/windscribe_windscribeservice_priv_escWindscribe WindscribeService Named Pipe Privilege Escalation
exploit/windows/local/wmiWindows Management Instrumentation (WMI) Remote Command Execution
exploit/windows/local/wmi_persistenceWMI Event Subscription Persistence
exploit/windows/lotus/domino_http_accept_languageIBM Lotus Domino Web Server Accept-Language Stack Buffer Overflow
exploit/windows/lotus/domino_icalendar_organizerIBM Lotus Domino iCalendar MAILTO Buffer Overflow
exploit/windows/lotus/domino_sametime_stmuxIBM Lotus Domino Sametime STMux.exe Stack Buffer Overflow
exploit/windows/lotus/lotusnotes_lzhLotus Notes 8.0.x - 8.5.2 FP2 - Autonomy Keyview (.lzh Attachment)
exploit/windows/lpd/hummingbird_exceedHummingbird Connectivity 10 SP5 LPD Buffer Overflow
exploit/windows/lpd/niprintNIPrint LPD Request Overflow
exploit/windows/lpd/saplpdSAP SAPLPD 6.28 Buffer Overflow
exploit/windows/lpd/wincomlpd_adminWinComLPD Buffer Overflow
exploit/windows/misc/achat_bofAchat Unicode SEH Buffer Overflow
exploit/windows/misc/actfax_raw_server_bofActFax 5.01 RAW Server Buffer Overflow
exploit/windows/misc/agentxpp_receive_agentxAgentX++ Master AgentX::receive_agentx Stack Buffer Overflow
exploit/windows/misc/ahsay_backup_fileuploadAhsay Backup v7.x-v8.1.1.50 (authenticated) file upload
exploit/windows/misc/ais_esel_server_rceAIS logistics ESEL-Server Unauth SQL Injection RCE
exploit/windows/misc/allmediaserver_bofALLMediaServer 0.8 Buffer Overflow
exploit/windows/misc/altiris_ds_sqliSymantec Altiris DS SQL Injection
exploit/windows/misc/apple_quicktime_rtsp_responseApple QuickTime 7.3 RTSP Response Header Buffer Overflow
exploit/windows/misc/asus_dpcproxy_overflowAsus Dpcproxy Buffer Overflow
exploit/windows/misc/avaya_winpmd_unihostrouterAvaya WinPMD UniteHostRouter Buffer Overflow
exploit/windows/misc/avidphoneticindexerAvid Media Composer 5.5 - Avid Phonetic Indexer Buffer Overflow
exploit/windows/misc/bakbone_netvault_heapBakBone NetVault Remote Heap Overflow
exploit/windows/misc/bcaaa_bofBlue Coat Authentication and Authorization Agent (BCAAA) 5 Buffer Overflow
exploit/windows/misc/bigant_server_250BigAnt Server 2.50 SP1 Buffer Overflow
exploit/windows/misc/bigant_server_dupf_uploadBigAnt Server DUPF Command Arbitrary File Upload
exploit/windows/misc/bigant_serverBigAnt Server 2.2 Buffer Overflow
exploit/windows/misc/bigant_server_sch_dupf_bofBigAnt Server 2 SCH And DUPF Buffer Overflow
exploit/windows/misc/bigant_server_usvBigAnt Server 2.52 USV Buffer Overflow
exploit/windows/misc/bomberclone_overflowBomberclone 0.11.6 Buffer Overflow
exploit/windows/misc/bopup_commBopup Communications Server Buffer Overflow
exploit/windows/misc/borland_interbaseBorland Interbase Create-Request Buffer Overflow
exploit/windows/misc/borland_starteamBorland CaliberRM StarTeam Multicast Service Buffer Overflow
exploit/windows/misc/citrix_streamprocess_data_msgCitrix Provisioning Services 5.6 SP1 Streamprocess Opcode 0x40020000 Buffer Overflow
exploit/windows/misc/citrix_streamprocess_get_boot_record_requestCitrix Provisioning Services 5.6 SP1 Streamprocess Opcode 0x40020004 Buffer Overflow
exploit/windows/misc/citrix_streamprocess_get_footerCitrix Provisioning Services 5.6 SP1 Streamprocess Opcode 0x40020002 Buffer Overflow
exploit/windows/misc/citrix_streamprocess_get_objectsCitrix Provisioning Services 5.6 SP1 Streamprocess Opcode 0x40020006 Buffer Overflow
exploit/windows/misc/citrix_streamprocessCitrix Provisioning Services 5.6 streamprocess.exe Buffer Overflow
exploit/windows/misc/cloudme_syncCloudMe Sync v1.10.9
exploit/windows/misc/commvault_cmd_execCommvault Communications Service (cvd) Command Injection
exploit/windows/misc/crosschex_device_bofAnviz CrossChex Buffer Overflow
exploit/windows/misc/cve_2022_28381_allmediaserver_bofALLMediaServer 1.6 SEH Buffer Overflow
exploit/windows/misc/disk_savvy_admDisk Savvy Enterprise v10.4.18
exploit/windows/misc/doubletakeDoubleTake/HP StorageWorks Storage Mirroring Service Authentication Overflow
exploit/windows/misc/eiqnetworks_esaeIQNetworks ESA License Manager LICMGR_ADDLICENSE Overflow
exploit/windows/misc/eiqnetworks_esa_topologyeIQNetworks ESA Topology DELETEDEVICE Overflow
exploit/windows/misc/enterasys_netsight_syslog_bofEnterasys NetSight nssyslogd.exe Buffer Overflow
exploit/windows/misc/eureka_mail_errEureka Email 2.2q ERR Remote Buffer Overflow
exploit/windows/misc/fb_cnct_groupFirebird Relational Database CNCT Group Number Buffer Overflow
exploit/windows/misc/fb_isc_attach_databaseFirebird Relational Database isc_attach_database() Buffer Overflow
exploit/windows/misc/fb_isc_create_databaseFirebird Relational Database isc_create_database() Buffer Overflow
exploit/windows/misc/fb_svc_attachFirebird Relational Database SVC_attach() Buffer Overflow
exploit/windows/misc/gh0stGh0st Client buffer Overflow
exploit/windows/misc/gimp_script_fuGIMP script-fu Server Buffer Overflow
exploit/windows/misc/hp_dataprotector_cmd_execHP Data Protector 8.10 Remote Command Execution
exploit/windows/misc/hp_dataprotector_crsHP Data Protector Cell Request Service Buffer Overflow
exploit/windows/misc/hp_dataprotector_dtbclsloginHP Data Protector DtbClsLogin Buffer Overflow
exploit/windows/misc/hp_dataprotector_encrypted_commsHP Data Protector Encrypted Communication Remote Command Execution
exploit/windows/misc/hp_dataprotector_exec_barHP Data Protector Backup Client Service Remote Code Execution
exploit/windows/misc/hp_dataprotector_install_serviceHP Data Protector 6.10/6.11/6.20 Install Service
exploit/windows/misc/hp_dataprotector_new_folderHP Data Protector Create New Folder Buffer Overflow
exploit/windows/misc/hp_dataprotector_traversalHP Data Protector Backup Client Service Directory Traversal
exploit/windows/misc/hp_imc_dbman_restartdb_unauth_rceHPE iMC dbman RestartDB Unauthenticated RCE
exploit/windows/misc/hp_imc_dbman_restoredbase_unauth_rceHPE iMC dbman RestoreDBase Unauthenticated RCE
exploit/windows/misc/hp_imc_uamHP Intelligent Management Center UAM Buffer Overflow
exploit/windows/misc/hp_loadrunner_magentproc_cmdexecHP Mercury LoadRunner Agent magentproc.exe Remote Command Execution
exploit/windows/misc/hp_loadrunner_magentprocHP LoadRunner magentproc.exe Overflow
exploit/windows/misc/hp_magentserviceHP Diagnostics Server magentservice.exe Overflow
exploit/windows/misc/hp_omniinet_1HP OmniInet.exe MSG_PROTOCOL Buffer Overflow
exploit/windows/misc/hp_omniinet_2HP OmniInet.exe MSG_PROTOCOL Buffer Overflow
exploit/windows/misc/hp_omniinet_3HP OmniInet.exe Opcode 27 Buffer Overflow
exploit/windows/misc/hp_omniinet_4HP OmniInet.exe Opcode 20 Buffer Overflow
exploit/windows/misc/hp_operations_agent_coda_34HP Operations Agent Opcode coda.exe 0x34 Buffer Overflow
exploit/windows/misc/hp_operations_agent_coda_8cHP Operations Agent Opcode coda.exe 0x8c Buffer Overflow
exploit/windows/misc/hp_ovtraceHP OpenView Operations OVTrace Buffer Overflow
exploit/windows/misc/hta_serverHTA Web Server
exploit/windows/misc/ib_isc_attach_databaseBorland InterBase isc_attach_database() Buffer Overflow
exploit/windows/misc/ib_isc_create_databaseBorland InterBase isc_create_database() Buffer Overflow
exploit/windows/misc/ibm_cognos_tm1admsd_bofIBM Cognos tm1admsd.exe Overflow
exploit/windows/misc/ibm_director_cim_dllinjectIBM System Director Agent DLL Injection
exploit/windows/misc/ibm_tsm_cad_pingIBM Tivoli Storage Manager Express CAD Service Buffer Overflow
exploit/windows/misc/ibm_tsm_rca_dicugetidentifyIBM Tivoli Storage Manager Express RCA Service Buffer Overflow
exploit/windows/misc/ibm_websphere_java_deserializeIBM WebSphere RCE Java Deserialization Vulnerability
exploit/windows/misc/ib_svc_attachBorland InterBase SVC_attach() Buffer Overflow
exploit/windows/misc/itunes_extm3u_bofApple iTunes 10 Extended M3U Stack Buffer Overflow
exploit/windows/misc/landesk_aolnsrvrLANDesk Management Suite 8.7 Alert Service Buffer Overflow
exploit/windows/misc/lianja_db_netLianja SQL 1.0.0RC5.1 db_netserver Stack Buffer Overflow
exploit/windows/misc/manageengine_eventlog_analyzer_rceManageEngine EventLog Analyzer Remote Code Execution
exploit/windows/misc/mercury_phonebookMercury/32 PH Server Module Buffer Overflow
exploit/windows/misc/mini_streamMini-Stream 3.0.1.1 Buffer Overflow
exploit/windows/misc/mirc_privmsg_servermIRC PRIVMSG Handling Stack Buffer Overflow
exploit/windows/misc/mobile_mouse_rceMobile Mouse RCE
exploit/windows/misc/ms07_064_samiMS07-064 Microsoft DirectX DirectShow SAMI Buffer Overflow
exploit/windows/misc/ms10_104_sharepointMS10-104 Microsoft Office SharePoint Server 2007 Remote Code Execution
exploit/windows/misc/netcat110_ntNetcat v1.10 NT Stack Buffer Overflow
exploit/windows/misc/nettransportNetTransport Download Manager 2.90.510 Buffer Overflow
exploit/windows/misc/nvidia_mental_rayNvidia Mental Ray Satellite Service Arbitrary DLL Injection
exploit/windows/misc/plugxPlugX Controller Stack Buffer Overflow
exploit/windows/misc/poisonivy_21x_bofPoison Ivy 2.1.x C2 Buffer Overflow
exploit/windows/misc/poisonivy_bofPoison Ivy Server Buffer Overflow
exploit/windows/misc/poppeeper_datePOP Peeper v3.4 DATE Buffer Overflow
exploit/windows/misc/poppeeper_uidlPOP Peeper v3.4 UIDL Buffer Overflow
exploit/windows/misc/realtek_playlistRealtek Media Player Playlist Buffer Overflow
exploit/windows/misc/remote_control_collection_rceRemote Control Collection RCE
exploit/windows/misc/remote_mouse_rceRemote Mouse RCE
exploit/windows/misc/sap_2005_licenseSAP Business One License Manager 2005 Buffer Overflow
exploit/windows/misc/sap_netweaver_dispatcherSAP NetWeaver Dispatcher DiagTraceR3Info Buffer Overflow
exploit/windows/misc/shixxnote_fontShixxNOTE 6.net Font Field Overflow
exploit/windows/misc/solidworks_workgroup_pdmwservice_file_writeSolidWorks Workgroup PDM 2014 pdmwService.exe Arbitrary File Write
exploit/windows/misc/splayer_content_typeSPlayer 3.7 Content-Type Buffer Overflow
exploit/windows/misc/stream_down_bofCoCSoft StreamDown 6.8.0 Buffer Overflow
exploit/windows/misc/talkative_responseTalkative IRC v0.4.4.16 Response Buffer Overflow
exploit/windows/misc/tiny_identd_overflowTinyIdentD 2.2 Stack Buffer Overflow
exploit/windows/misc/trendmicro_cmdprocessor_addtaskTrendMicro Control Manger CmdProcessor.exe Stack Buffer Overflow
exploit/windows/misc/ufo_aiUFO: Alien Invasion IRC Client Buffer Overflow
exploit/windows/misc/unified_remote_rceUnified Remote Auth Bypass to RCE
exploit/windows/misc/veeam_one_agent_deserializationVeeam ONE Agent .NET Deserialization
exploit/windows/misc/vmhgfs_webdav_dll_sideloadDLL Side Loading Vulnerability in VMware Host Guest Client Redirector
exploit/windows/misc/webdav_deliveryServe DLL via webdav server
exploit/windows/misc/wifi_mouse_rceWifi Mouse RCE
exploit/windows/misc/windows_rshWindows RSH Daemon Buffer Overflow
exploit/windows/misc/wireshark_luaWireshark console.lua Pre-Loading Script Execution
exploit/windows/misc/wireshark_packet_dectWireshark packet-dect.c Stack Buffer Overflow
exploit/windows/mmsp/ms10_025_wmss_connect_funnelWindows Media Services ConnectFunnel Stack Buffer Overflow
exploit/windows/motorola/timbuktu_fileuploadTimbuktu Pro Directory Traversal/File Upload
exploit/windows/mssql/lyris_listmanager_weak_passLyris ListManager MSDE Weak sa Password
exploit/windows/mssql/ms02_039_slammerMS02-039 Microsoft SQL Server Resolution Overflow
exploit/windows/mssql/ms02_056_helloMS02-056 Microsoft SQL Server Hello Overflow
exploit/windows/mssql/ms09_004_sp_replwritetovarbinMS09-004 Microsoft SQL Server sp_replwritetovarbin Memory Corruption
exploit/windows/mssql/ms09_004_sp_replwritetovarbin_sqliMS09-004 Microsoft SQL Server sp_replwritetovarbin Memory Corruption via SQL Injection
exploit/windows/mssql/mssql_clr_payloadMicrosoft SQL Server Clr Stored Procedure Payload Execution
exploit/windows/mssql/mssql_linkcrawlerMicrosoft SQL Server Database Link Crawling Command Execution
exploit/windows/mssql/mssql_payloadMicrosoft SQL Server Payload Execution
exploit/windows/mssql/mssql_payload_sqliMicrosoft SQL Server Payload Execution via SQL Injection
exploit/windows/mysql/mysql_mofOracle MySQL for Microsoft Windows MOF Execution
exploit/windows/mysql/mysql_start_upOracle MySQL for Microsoft Windows FILE Privilege Abuse
exploit/windows/mysql/mysql_yassl_helloMySQL yaSSL SSL Hello Message Buffer Overflow
exploit/windows/mysql/scrutinizer_upload_execPlixer Scrutinizer NetFlow and sFlow Analyzer 9 Default MySQL Credential
exploit/windows/nfs/xlink_nfsdOmni-NFS Server Buffer Overflow
exploit/windows/nimsoft/nimcontroller_bofCA Unified Infrastructure Management Nimsoft 7.80 - Remote Buffer Overflow
exploit/windows/nntp/ms05_030_nntpMS05-030 Microsoft Outlook Express NNTP Response Parsing Buffer Overflow
exploit/windows/novell/file_reporter_fsfui_uploadNFR Agent FSFUI Record File Upload RCE
exploit/windows/novell/groupwisemessenger_clientNovell GroupWise Messenger Client Buffer Overflow
exploit/windows/novell/netiq_pum_evalNetIQ Privileged User Manager 2.3.1 ldapagnt_eval() Remote Perl Code Execution
exploit/windows/novell/nmap_storNovell NetMail NMAP STOR Buffer Overflow
exploit/windows/novell/zenworks_desktop_agentNovell ZENworks 6.5 Desktop/Server Management Overflow
exploit/windows/novell/zenworks_preboot_op21_bofNovell ZENworks Configuration Management Preboot Service 0x21 Buffer Overflow
exploit/windows/novell/zenworks_preboot_op4c_bofNovell ZENworks Configuration Management Preboot Service 0x4c Buffer Overflow
exploit/windows/novell/zenworks_preboot_op6_bofNovell ZENworks Configuration Management Preboot Service 0x06 Buffer Overflow
exploit/windows/novell/zenworks_preboot_op6c_bofNovell ZENworks Configuration Management Preboot Service 0x6c Buffer Overflow
exploit/windows/nuuo/nuuo_cms_fuNuuo Central Management Server Authenticated Arbitrary File Upload
exploit/windows/nuuo/nuuo_cms_sqliNuuo Central Management Authenticated SQL Server SQLi
exploit/windows/oracle/client_system_analyzer_uploadOracle Database Client System Analyzer Arbitrary File Upload
exploit/windows/oracle/extjobOracle Job Scheduler Named Pipe Command Execution
exploit/windows/oracle/osb_ndmp_authOracle Secure Backup NDMP_CONNECT_CLIENT_AUTH Buffer Overflow
exploit/windows/oracle/tns_argumentsOracle 8i TNS Listener (ARGUMENTS) Buffer Overflow
exploit/windows/oracle/tns_auth_sesskeyOracle 10gR2 TNS Listener AUTH_SESSKEY Buffer Overflow
exploit/windows/oracle/tns_service_nameOracle 8i TNS Listener SERVICE_NAME Buffer Overflow
exploit/windows/pop3/seattlelab_passSeattle Lab Mail 5.5 POP3 Buffer Overflow
exploit/windows/postgres/postgres_payloadPostgreSQL for Microsoft Windows Payload Execution
exploit/windows/proxy/bluecoat_winproxy_hostBlue Coat WinProxy Host Header Overflow
exploit/windows/proxy/ccproxy_telnet_pingCCProxy Telnet Proxy Ping Overflow
exploit/windows/proxy/proxypro_http_getProxy-Pro Professional GateKeeper 4.7 GET Request Overflow
exploit/windows/proxy/qbik_wingate_wwwproxyQbik WinGate WWW Proxy Server URL Processing Overflow
exploit/windows/rdp/cve_2019_0708_bluekeep_rceCVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free
exploit/windows/rdp/rdp_doublepulsar_rceRDP DOUBLEPULSAR Remote Code Execution
exploit/windows/sage/x3_adxsrv_auth_bypass_cmd_execSage X3 Administration Service Authentication Bypass Command Execution
exploit/windows/scada/abb_wserver_execABB MicroSCADA wserver.exe Remote Code Execution
exploit/windows/scada/advantech_webaccess_dashboard_file_uploadAdvantech WebAccess Dashboard Viewer uploadImageCommon Arbitrary File Upload
exploit/windows/scada/advantech_webaccess_webvrpcs_bofAdvantech WebAccess Webvrpcs Service Opcode 80061 Stack Buffer Overflow
exploit/windows/scada/citect_scada_odbcCitectSCADA/CitectFacilities ODBC Buffer Overflow
exploit/windows/scada/codesys_gateway_server_traversalSCADA 3S CoDeSys Gateway Server Directory Traversal
exploit/windows/scada/codesys_web_serverSCADA 3S CoDeSys CmpWebServer Stack Buffer Overflow
exploit/windows/scada/daq_factory_bofDaqFactory HMI NETB Request Overflow
exploit/windows/scada/delta_ia_commgr_bofDelta Electronics Delta Industrial Automation COMMGR 1.08 Stack Buffer Overflow
exploit/windows/scada/factorylink_csserviceSiemens FactoryLink 8 CSService Logging Path Param Buffer Overflow
exploit/windows/scada/factorylink_vrn_09Siemens FactoryLink vrn.exe Opcode 9 Buffer Overflow
exploit/windows/scada/ge_proficy_cimplicity_gefebtGE Proficy CIMPLICITY gefebt.exe Remote Code Execution
exploit/windows/scada/iconics_genbrokerIconics GENESIS32 Integer Overflow Version 9.21.201.01
exploit/windows/scada/iconics_webhmi_setactivexguidICONICS WebHMI ActiveX Buffer Overflow
exploit/windows/scada/igss9_igssdataserver_listall7-Technologies IGSS IGSSdataServer.exe Stack Buffer Overflow
exploit/windows/scada/igss9_igssdataserver_rename7-Technologies IGSS 9 IGSSdataServer .RMS Rename Buffer Overflow
exploit/windows/scada/igss9_misc7-Technologies IGSS 9 Data Server/Collector Packet Handling Vulnerabilities
exploit/windows/scada/igss_exec_17Interactive Graphical SCADA System Remote Command Injection
exploit/windows/scada/indusoft_webstudio_execInduSoft Web Studio Arbitrary Upload Remote Code Execution
exploit/windows/scada/moxa_mdmtoolMOXA Device Manager Tool 2.1 Buffer Overflow
exploit/windows/scada/procyon_core_serverProcyon Core Server HMI Coreservice.exe Stack Buffer Overflow
exploit/windows/scada/realwinDATAC RealWin SCADA Server Buffer Overflow
exploit/windows/scada/realwin_on_fc_binfile_aDATAC RealWin SCADA Server 2 On_FC_CONNECT_FCS_a_FILE Buffer Overflow
exploit/windows/scada/realwin_on_fcs_loginRealWin SCADA Server DATAC Login Buffer Overflow
exploit/windows/scada/realwin_scpc_initializeDATAC RealWin SCADA Server SCPC_INITIALIZE Buffer Overflow
exploit/windows/scada/realwin_scpc_initialize_rfDATAC RealWin SCADA Server SCPC_INITIALIZE_RF Buffer Overflow
exploit/windows/scada/realwin_scpc_txteventDATAC RealWin SCADA Server SCPC_TXTEVENT Buffer Overflow
exploit/windows/scada/rockwell_factorytalk_rceRockwell FactoryTalk View SE SCADA Unauthenticated Remote Code Execution
exploit/windows/scada/scadapro_cmdexeMeasuresoft ScadaPro Remote Command Execution
exploit/windows/scada/sunway_force_control_netdbsrvSunway Forcecontrol SNMP NetDBServer.exe Opcode 0x57
exploit/windows/scada/winlog_runtime_2Sielco Sistemi Winlog Buffer Overflow 2.07.14 - 2.07.16
exploit/windows/scada/winlog_runtimeSielco Sistemi Winlog Buffer Overflow
exploit/windows/scada/yokogawa_bkbcopyd_bofYokogawa CENTUM CS 3000 BKBCopyD.exe Buffer Overflow
exploit/windows/scada/yokogawa_bkesimmgr_bofYokogawa CS3000 BKESimmgr.exe Buffer Overflow
exploit/windows/scada/yokogawa_bkfsim_vhfdYokogawa CS3000 BKFSim_vhfd.exe Buffer Overflow
exploit/windows/scada/yokogawa_bkhodeq_bofYokogawa CENTUM CS 3000 BKHOdeq.exe Buffer Overflow
exploit/windows/sip/aim_triton_cseqAIM Triton 1.0.4 CSeq Buffer Overflow
exploit/windows/sip/sipxezphone_cseqSIPfoundry sipXezPhone 0.35a CSeq Field Overflow
exploit/windows/sip/sipxphone_cseqSIPfoundry sipXphone 2.6.0.27 CSeq Buffer Overflow
exploit/windows/smb/cve_2020_0796_smbghostSMBv3 Compression Buffer Overflow
exploit/windows/smb/generic_smb_dll_injectionGeneric DLL Injection From Shared Resource
exploit/windows/smb/group_policy_startupGroup Policy Script Execution From Shared Resource
exploit/windows/smb/ipass_pipe_execIPass Control Pipe Remote Command Execution
exploit/windows/smb/ms03_049_netapiMS03-049 Microsoft Workstation Service NetAddAlternateComputerName Overflow
exploit/windows/smb/ms04_007_killbillMS04-007 Microsoft ASN.1 Library Bitstring Heap Overflow
exploit/windows/smb/ms04_011_lsassMS04-011 Microsoft LSASS Service DsRolerUpgradeDownlevelServer Overflow
exploit/windows/smb/ms04_031_netddeMS04-031 Microsoft NetDDE Service Overflow
exploit/windows/smb/ms05_039_pnpMS05-039 Microsoft Plug and Play Service Overflow
exploit/windows/smb/ms06_025_rasmans_regMS06-025 Microsoft RRAS Service RASMAN Registry Overflow
exploit/windows/smb/ms06_025_rrasMS06-025 Microsoft RRAS Service Overflow
exploit/windows/smb/ms06_040_netapiMS06-040 Microsoft Server Service NetpwPathCanonicalize Overflow
exploit/windows/smb/ms06_066_nwapiMS06-066 Microsoft Services nwapi32.dll Module Exploit
exploit/windows/smb/ms06_066_nwwksMS06-066 Microsoft Services nwwks.dll Module Exploit
exploit/windows/smb/ms06_070_wkssvcMS06-070 Microsoft Workstation Service NetpManageIPCConnect Overflow
exploit/windows/smb/ms07_029_msdns_zonenameMS07-029 Microsoft DNS RPC Service extractQuotedChar() Overflow (SMB)
exploit/windows/smb/ms08_067_netapiMS08-067 Microsoft Server Service Relative Path Stack Corruption
exploit/windows/smb/ms09_050_smb2_negotiate_func_indexMS09-050 Microsoft SRV2.SYS SMB Negotiate ProcessID Function Table Dereference
exploit/windows/smb/ms10_046_shortcut_icon_dllloaderMicrosoft Windows Shell LNK Code Execution
exploit/windows/smb/ms10_061_spoolssMS10-061 Microsoft Print Spooler Service Impersonation Vulnerability
exploit/windows/smb/ms15_020_shortcut_icon_dllloaderMicrosoft Windows Shell LNK Code Execution
exploit/windows/smb/ms17_010_eternalblueMS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption
exploit/windows/smb/ms17_010_eternalblue_win8MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption
exploit/windows/smb/ms17_010_psexecMS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Code Execution
exploit/windows/smb/netidentity_xtierrpcpipeNovell NetIdentity Agent XTIERRPCPIPE Named Pipe Buffer Overflow
exploit/windows/smb/psexecMicrosoft Windows Authenticated User Code Execution
exploit/windows/smb/smb_deliverySMB Delivery
exploit/windows/smb/smb_doublepulsar_rceSMB DOUBLEPULSAR Remote Code Execution
exploit/windows/smb/smb_relayMS08-068 Microsoft Windows SMB Relay Code Execution
exploit/windows/smb/smb_rras_erraticgopherMicrosoft Windows RRAS Service MIBEntryGet Overflow
exploit/windows/smb/smb_shadowMicrosoft Windows SMB Direct Session Takeover
exploit/windows/smb/timbuktu_plughntcommand_bofTimbuktu PlughNTCommand Named Pipe Buffer Overflow
exploit/windows/smb/webexecWebExec Authenticated User Code Execution
exploit/windows/smtp/mailcarrier_smtp_ehloTABS MailCarrier v2.51 SMTP EHLO Overflow
exploit/windows/smtp/mercury_cram_md5Mercury Mail SMTP AUTH CRAM-MD5 Buffer Overflow
exploit/windows/smtp/ms03_046_exchange2000_xexch50MS03-046 Exchange 2000 XEXCH50 Heap Overflow
exploit/windows/smtp/njstar_smtp_bofNJStar Communicator 3.00 MiniSMTP Buffer Overflow
exploit/windows/smtp/sysgauge_client_bofSysGauge SMTP Validation Buffer Overflow
exploit/windows/smtp/wmailserverSoftiaCom WMailserver 1.0 Buffer Overflow
exploit/windows/smtp/ypops_overflow1YPOPS 0.6 Buffer Overflow
exploit/windows/ssh/freeftpd_key_exchangeFreeFTPd 1.0.10 Key Exchange Algorithm String Buffer Overflow
exploit/windows/ssh/freesshd_authbypassFreesshd Authentication Bypass
exploit/windows/ssh/freesshd_key_exchangeFreeSSHd 1.0.9 Key Exchange Algorithm String Buffer Overflow
exploit/windows/ssh/putty_msg_debugPuTTY Buffer Overflow
exploit/windows/ssh/securecrt_ssh1SecureCRT SSH1 Buffer Overflow
exploit/windows/ssh/sysax_ssh_usernameSysax 5.53 SSH Username Buffer Overflow
exploit/windows/ssl/ms04_011_pctMS04-011 Microsoft Private Communications Transport Overflow
exploit/windows/telnet/gamsoft_telsrv_usernameGAMSoft TelSrv 1.5 Username Buffer Overflow
exploit/windows/telnet/goodtech_telnetGoodTech Telnet Server Buffer Overflow
exploit/windows/tftp/attftp_long_filenameAllied Telesyn TFTP Server 1.9 Long Filename Overflow
exploit/windows/tftp/distinct_tftp_traversalDistinct TFTP 3.10 Writable Directory Traversal Execution
exploit/windows/tftp/dlink_long_filenameD-Link TFTP 1.0 Long Filename Buffer Overflow
exploit/windows/tftp/futuresoft_transfermodeFutureSoft TFTP Server 2000 Transfer-Mode Overflow
exploit/windows/tftp/netdecision_tftp_traversalNetDecision 4.2 TFTP Writable Directory Traversal Execution
exploit/windows/tftp/opentftp_error_codeOpenTFTP SP 1.4 Error Packet Overflow
exploit/windows/tftp/quick_tftp_pro_modeQuick FTP Pro 2.1 Transfer-Mode Overflow
exploit/windows/tftp/tftpd32_long_filenameTFTPD32 Long Filename Buffer Overflow
exploit/windows/tftp/tftpdwin_long_filenameTFTPDWIN v0.4.2 Long Filename Buffer Overflow
exploit/windows/tftp/tftpserver_wrq_bofTFTP Server for Windows 1.4 ST WRQ Buffer Overflow
exploit/windows/tftp/threectftpsvc_long_mode3CTftpSvc TFTP Long Mode Buffer Overflow
exploit/windows/unicenter/cam_log_securityCA CAM log_security() Stack Buffer Overflow (Win32)
exploit/windows/vnc/realvnc_clientRealVNC 3.3.7 Client Buffer Overflow
exploit/windows/vnc/ultravnc_clientUltraVNC 1.0.1 Client Buffer Overflow
exploit/windows/vnc/ultravnc_viewer_bofUltraVNC 1.0.2 Client (vncviewer.exe) Buffer Overflow
exploit/windows/vnc/winvnc_http_getWinVNC Web Server GET Overflow
exploit/windows/vpn/safenet_ike_11SafeNet SoftRemote IKE Service Buffer Overflow
exploit/windows/winrm/winrm_script_execWinRM Script Exec Remote Code Execution
exploit/windows/wins/ms04_045_winsMS04-045 Microsoft WINS Service Memory Overwrite
nop/aarch64/simpleSimple
nop/armle/simpleSimple
nop/cmd/genericGeneric Command Nop Generator
nop/mipsbe/betterBetter
nop/php/genericPHP Nop Generator
nop/ppc/simpleSimple
nop/sparc/randomSPARC NOP Generator
nop/tty/genericTTY Nop Generator
nop/x64/simpleSimple
nop/x86/opty2Opty2
nop/x86/single_byteSingle Byte
payload/aix/ppc/shell_bind_tcpAIX Command Shell, Bind TCP Inline
payload/aix/ppc/shell_find_portAIX Command Shell, Find Port Inline
payload/aix/ppc/shell_interactAIX execve Shell for inetd
payload/aix/ppc/shell_reverse_tcpAIX Command Shell, Reverse TCP Inline
payload/android/meterpreter/reverse_httpAndroid Meterpreter, Android Reverse HTTP Stager
payload/android/meterpreter_reverse_httpAndroid Meterpreter Shell, Reverse HTTP Inline
payload/android/meterpreter/reverse_httpsAndroid Meterpreter, Android Reverse HTTPS Stager
payload/android/meterpreter_reverse_httpsAndroid Meterpreter Shell, Reverse HTTPS Inline
payload/android/meterpreter/reverse_tcpAndroid Meterpreter, Android Reverse TCP Stager
payload/android/meterpreter_reverse_tcpAndroid Meterpreter Shell, Reverse TCP Inline
payload/android/shell/reverse_httpCommand Shell, Android Reverse HTTP Stager
payload/android/shell/reverse_httpsCommand Shell, Android Reverse HTTPS Stager
payload/android/shell/reverse_tcpCommand Shell, Android Reverse TCP Stager
payload/apple_ios/aarch64/meterpreter_reverse_httpApple_iOS Meterpreter, Reverse HTTP Inline
payload/apple_ios/aarch64/meterpreter_reverse_httpsApple_iOS Meterpreter, Reverse HTTPS Inline
payload/apple_ios/aarch64/meterpreter_reverse_tcpApple_iOS Meterpreter, Reverse TCP Inline
payload/apple_ios/aarch64/shell_reverse_tcpApple iOS aarch64 Command Shell, Reverse TCP Inline
payload/apple_ios/armle/meterpreter_reverse_httpApple_iOS Meterpreter, Reverse HTTP Inline
payload/apple_ios/armle/meterpreter_reverse_httpsApple_iOS Meterpreter, Reverse HTTPS Inline
payload/apple_ios/armle/meterpreter_reverse_tcpApple_iOS Meterpreter, Reverse TCP Inline
payload/bsdi/x86/shell/bind_tcpBSDi Command Shell, Bind TCP Stager
payload/bsdi/x86/shell_bind_tcpBSDi Command Shell, Bind TCP Inline
payload/bsdi/x86/shell_find_portBSDi Command Shell, Find Port Inline
payload/bsdi/x86/shell/reverse_tcpBSDi Command Shell, Reverse TCP Stager
payload/bsdi/x86/shell_reverse_tcpBSDi Command Shell, Reverse TCP Inline
payload/bsd/sparc/shell_bind_tcpBSD Command Shell, Bind TCP Inline
payload/bsd/sparc/shell_reverse_tcpBSD Command Shell, Reverse TCP Inline
payload/bsd/vax/shell_reverse_tcpBSD Command Shell, Reverse TCP Inline
payload/bsd/x64/execBSD x64 Execute Command
payload/bsd/x64/shell_bind_ipv6_tcpBSD x64 Command Shell, Bind TCP Inline (IPv6)
payload/bsd/x64/shell_bind_tcpBSD x64 Shell Bind TCP
payload/bsd/x64/shell_bind_tcp_smallBSD x64 Command Shell, Bind TCP Inline
payload/bsd/x64/shell_reverse_ipv6_tcpBSD x64 Command Shell, Reverse TCP Inline (IPv6)
payload/bsd/x64/shell_reverse_tcpBSD x64 Shell Reverse TCP
payload/bsd/x64/shell_reverse_tcp_smallBSD x64 Command Shell, Reverse TCP Inline
payload/bsd/x86/execBSD Execute Command
payload/bsd/x86/metsvc_bind_tcpFreeBSD Meterpreter Service, Bind TCP
payload/bsd/x86/metsvc_reverse_tcpFreeBSD Meterpreter Service, Reverse TCP Inline
payload/bsd/x86/shell/bind_ipv6_tcpBSD Command Shell, Bind TCP Stager (IPv6)
payload/bsd/x86/shell/bind_tcpBSD Command Shell, Bind TCP Stager
payload/bsd/x86/shell_bind_tcpBSD Command Shell, Bind TCP Inline
payload/bsd/x86/shell_bind_tcp_ipv6BSD Command Shell, Bind TCP Inline (IPv6)
payload/bsd/x86/shell_find_portBSD Command Shell, Find Port Inline
payload/bsd/x86/shell/find_tagBSD Command Shell, Find Tag Stager
payload/bsd/x86/shell_find_tagBSD Command Shell, Find Tag Inline
payload/bsd/x86/shell/reverse_ipv6_tcpBSD Command Shell, Reverse TCP Stager (IPv6)
payload/bsd/x86/shell/reverse_tcpBSD Command Shell, Reverse TCP Stager
payload/bsd/x86/shell_reverse_tcpBSD Command Shell, Reverse TCP Inline
payload/bsd/x86/shell_reverse_tcp_ipv6BSD Command Shell, Reverse TCP Inline (IPv6)
payload/cmd/mainframe/apf_privesc_jclJCL to Escalate Privileges
payload/cmd/mainframe/bind_shell_jclZ/OS (MVS) Command Shell, Bind TCP
payload/cmd/mainframe/generic_jclGeneric JCL Test for Mainframe Exploits
payload/cmd/mainframe/reverse_shell_jclZ/OS (MVS) Command Shell, Reverse TCP
payload/cmd/unix/bind_awkUnix Command Shell, Bind TCP (via AWK)
payload/cmd/unix/bind_busybox_telnetdUnix Command Shell, Bind TCP (via BusyBox telnetd)
payload/cmd/unix/bind_inetdUnix Command Shell, Bind TCP (inetd)
payload/cmd/unix/bind_jjsUnix Command Shell, Bind TCP (via jjs)
payload/cmd/unix/bind_luaUnix Command Shell, Bind TCP (via Lua)
payload/cmd/unix/bind_netcat_gapingUnix Command Shell, Bind TCP (via netcat -e)
payload/cmd/unix/bind_netcat_gaping_ipv6Unix Command Shell, Bind TCP (via netcat -e) IPv6
payload/cmd/unix/bind_netcatUnix Command Shell, Bind TCP (via netcat)
payload/cmd/unix/bind_nodejsUnix Command Shell, Bind TCP (via nodejs)
payload/cmd/unix/bind_perlUnix Command Shell, Bind TCP (via Perl)
payload/cmd/unix/bind_perl_ipv6Unix Command Shell, Bind TCP (via perl) IPv6
payload/cmd/unix/bind_rUnix Command Shell, Bind TCP (via R)
payload/cmd/unix/bind_rubyUnix Command Shell, Bind TCP (via Ruby)
payload/cmd/unix/bind_ruby_ipv6Unix Command Shell, Bind TCP (via Ruby) IPv6
payload/cmd/unix/bind_socat_udpUnix Command Shell, Bind UDP (via socat)
payload/cmd/unix/bind_stubUnix Command Shell, Bind TCP (stub)
payload/cmd/unix/bind_zshUnix Command Shell, Bind TCP (via Zsh)
payload/cmd/unix/genericUnix Command, Generic Command Execution
payload/cmd/unix/interactUnix Command, Interact with Established Connection
payload/cmd/unix/pingback_bindUnix Command Shell, Pingback Bind TCP (via netcat)
payload/cmd/unix/pingback_reverseUnix Command Shell, Pingback Reverse TCP (via netcat)
payload/cmd/unix/python/meterpreter/bind_tcpPython Exec, Python Meterpreter, Python Bind TCP Stager
payload/cmd/unix/python/meterpreter_bind_tcpPython Exec, Python Meterpreter Shell, Bind TCP Inline
payload/cmd/unix/python/meterpreter/bind_tcp_uuidPython Exec, Python Meterpreter, Python Bind TCP Stager with UUID Support
payload/cmd/unix/python/meterpreter/reverse_httpPython Exec, Python Meterpreter, Python Reverse HTTP Stager
payload/cmd/unix/python/meterpreter_reverse_httpPython Exec, Python Meterpreter Shell, Reverse HTTP Inline
payload/cmd/unix/python/meterpreter/reverse_httpsPython Exec, Python Meterpreter, Python Reverse HTTPS Stager
payload/cmd/unix/python/meterpreter_reverse_httpsPython Exec, Python Meterpreter Shell, Reverse HTTPS Inline
payload/cmd/unix/python/meterpreter/reverse_tcpPython Exec, Python Meterpreter, Python Reverse TCP Stager
payload/cmd/unix/python/meterpreter_reverse_tcpPython Exec, Python Meterpreter Shell, Reverse TCP Inline
payload/cmd/unix/python/meterpreter/reverse_tcp_sslPython Exec, Python Meterpreter, Python Reverse TCP SSL Stager
payload/cmd/unix/python/meterpreter/reverse_tcp_uuidPython Exec, Python Meterpreter, Python Reverse TCP Stager with UUID Support
payload/cmd/unix/python/pingback_bind_tcpPython Exec, Python Pingback, Bind TCP (via python)
payload/cmd/unix/python/pingback_reverse_tcpPython Exec, Python Pingback, Reverse TCP (via python)
payload/cmd/unix/python/shell_bind_tcpPython Exec, Command Shell, Bind TCP (via python)
payload/cmd/unix/python/shell_reverse_tcpPython Exec, Command Shell, Reverse TCP (via python)
payload/cmd/unix/python/shell_reverse_tcp_sslPython Exec, Command Shell, Reverse TCP SSL (via python)
payload/cmd/unix/python/shell_reverse_udpPython Exec, Command Shell, Reverse UDP (via python)
payload/cmd/unix/reverse_awkUnix Command Shell, Reverse TCP (via AWK)
payload/cmd/unix/reverse_bashUnix Command Shell, Reverse TCP (/dev/tcp)
payload/cmd/unix/reverse_bash_telnet_sslUnix Command Shell, Reverse TCP SSL (telnet)
payload/cmd/unix/reverse_bash_udpUnix Command Shell, Reverse UDP (/dev/udp)
payload/cmd/unix/reverseUnix Command Shell, Double Reverse TCP (telnet)
payload/cmd/unix/reverse_jjsUnix Command Shell, Reverse TCP (via jjs)
payload/cmd/unix/reverse_kshUnix Command Shell, Reverse TCP (via Ksh)
payload/cmd/unix/reverse_luaUnix Command Shell, Reverse TCP (via Lua)
payload/cmd/unix/reverse_ncat_sslUnix Command Shell, Reverse TCP (via ncat)
payload/cmd/unix/reverse_netcat_gapingUnix Command Shell, Reverse TCP (via netcat -e)
payload/cmd/unix/reverse_netcatUnix Command Shell, Reverse TCP (via netcat)
payload/cmd/unix/reverse_nodejsUnix Command Shell, Reverse TCP (via nodejs)
payload/cmd/unix/reverse_opensslUnix Command Shell, Double Reverse TCP SSL (openssl)
payload/cmd/unix/reverse_perlUnix Command Shell, Reverse TCP (via Perl)
payload/cmd/unix/reverse_perl_sslUnix Command Shell, Reverse TCP SSL (via perl)
payload/cmd/unix/reverse_php_sslUnix Command Shell, Reverse TCP SSL (via php)
payload/cmd/unix/reverse_pythonUnix Command Shell, Reverse TCP (via Python)
payload/cmd/unix/reverse_python_sslUnix Command Shell, Reverse TCP SSL (via python)
payload/cmd/unix/reverse_rUnix Command Shell, Reverse TCP (via R)
payload/cmd/unix/reverse_rubyUnix Command Shell, Reverse TCP (via Ruby)
payload/cmd/unix/reverse_ruby_sslUnix Command Shell, Reverse TCP SSL (via Ruby)
payload/cmd/unix/reverse_socat_udpUnix Command Shell, Reverse UDP (via socat)
payload/cmd/unix/reverse_sshUnix Command Shell, Reverse TCP SSH
payload/cmd/unix/reverse_ssl_double_telnetUnix Command Shell, Double Reverse TCP SSL (telnet)
payload/cmd/unix/reverse_stubUnix Command Shell, Reverse TCP (stub)
payload/cmd/unix/reverse_tclshUnix Command Shell, Reverse TCP (via Tclsh)
payload/cmd/unix/reverse_zshUnix Command Shell, Reverse TCP (via Zsh)
payload/cmd/windows/adduserWindows Execute net user /ADD CMD
payload/cmd/windows/bind_luaWindows Command Shell, Bind TCP (via Lua)
payload/cmd/windows/bind_perlWindows Command Shell, Bind TCP (via Perl)
payload/cmd/windows/bind_perl_ipv6Windows Command Shell, Bind TCP (via perl) IPv6
payload/cmd/windows/bind_rubyWindows Command Shell, Bind TCP (via Ruby)
payload/cmd/windows/download_eval_vbsWindows Executable Download and Evaluate VBS
payload/cmd/windows/download_exec_vbsWindows Executable Download and Execute (via .vbs)
payload/cmd/windows/genericWindows Command, Generic Command Execution
payload/cmd/windows/jjs_reverse_tcpWindows Shell, Reverse TCP (via jjs)
payload/cmd/windows/powershell/adduserPowershell Exec
payload/cmd/windows/powershell_bind_tcpWindows Interactive Powershell Session, Bind TCP
payload/cmd/windows/powershell/custom/bind_hidden_ipknock_tcpPowershell Exec, Windows shellcode stage, Hidden Bind Ipknock TCP Stager
payload/cmd/windows/powershell/custom/bind_hidden_tcpPowershell Exec, Windows shellcode stage, Hidden Bind TCP Stager
payload/cmd/windows/powershell/custom/bind_ipv6_tcpPowershell Exec, Windows shellcode stage, Bind IPv6 TCP Stager (Windows x86)
payload/cmd/windows/powershell/custom/bind_ipv6_tcp_uuidPowershell Exec, Windows shellcode stage, Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/custom/bind_named_pipePowershell Exec, Windows shellcode stage, Windows x86 Bind Named Pipe Stager
payload/cmd/windows/powershell/custom/bind_nonx_tcpPowershell Exec, Windows shellcode stage, Bind TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/custom/bind_tcpPowershell Exec, Windows shellcode stage, Bind TCP Stager (Windows x86)
payload/cmd/windows/powershell/custom/bind_tcp_rc4Powershell Exec, Windows shellcode stage, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/custom/bind_tcp_uuidPowershell Exec, Windows shellcode stage, Bind TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/custom/find_tagPowershell Exec, Windows shellcode stage, Find Tag Ordinal Stager
payload/cmd/windows/powershell/custom/reverse_hop_httpPowershell Exec, Windows shellcode stage, Reverse Hop HTTP/HTTPS Stager
payload/cmd/windows/powershell/custom/reverse_httpPowershell Exec, Windows shellcode stage, Windows Reverse HTTP Stager (wininet)
payload/cmd/windows/powershell/custom/reverse_http_proxy_pstorePowershell Exec, Windows shellcode stage, Reverse HTTP Stager Proxy
payload/cmd/windows/powershell/custom/reverse_httpsPowershell Exec, Windows shellcode stage, Windows Reverse HTTPS Stager (wininet)
payload/cmd/windows/powershell/custom/reverse_https_proxyPowershell Exec, Windows shellcode stage, Reverse HTTPS Stager with Support for Custom Proxy
payload/cmd/windows/powershell/custom/reverse_ipv6_tcpPowershell Exec, Windows shellcode stage, Reverse TCP Stager (IPv6)
payload/cmd/windows/powershell/custom/reverse_named_pipePowershell Exec, Windows shellcode stage, Windows x86 Reverse Named Pipe (SMB) Stager
payload/cmd/windows/powershell/custom/reverse_nonx_tcpPowershell Exec, Windows shellcode stage, Reverse TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/custom/reverse_ord_tcpPowershell Exec, Windows shellcode stage, Reverse Ordinal TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/custom/reverse_tcp_allportsPowershell Exec, Windows shellcode stage, Reverse All-Port TCP Stager
payload/cmd/windows/powershell/custom/reverse_tcp_dnsPowershell Exec, Windows shellcode stage, Reverse TCP Stager (DNS)
payload/cmd/windows/powershell/custom/reverse_tcpPowershell Exec, Windows shellcode stage, Reverse TCP Stager
payload/cmd/windows/powershell/custom/reverse_tcp_rc4_dnsPowershell Exec, Windows shellcode stage, Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/cmd/windows/powershell/custom/reverse_tcp_rc4Powershell Exec, Windows shellcode stage, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/custom/reverse_tcp_uuidPowershell Exec, Windows shellcode stage, Reverse TCP Stager with UUID Support
payload/cmd/windows/powershell/custom/reverse_udpPowershell Exec, Windows shellcode stage, Reverse UDP Stager with UUID Support
payload/cmd/windows/powershell/custom/reverse_winhttpPowershell Exec, Windows shellcode stage, Windows Reverse HTTP Stager (winhttp)
payload/cmd/windows/powershell/custom/reverse_winhttpsPowershell Exec, Windows shellcode stage, Windows Reverse HTTPS Stager (winhttp)
payload/cmd/windows/powershell/dllinject/bind_hidden_ipknock_tcpPowershell Exec, Hidden Bind Ipknock TCP Stager
payload/cmd/windows/powershell/dllinject/bind_hidden_tcpPowershell Exec, Hidden Bind TCP Stager
payload/cmd/windows/powershell/dllinject/bind_ipv6_tcpPowershell Exec, Bind IPv6 TCP Stager (Windows x86)
payload/cmd/windows/powershell/dllinject/bind_ipv6_tcp_uuidPowershell Exec, Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/dllinject/bind_named_pipePowershell Exec, Windows x86 Bind Named Pipe Stager
payload/cmd/windows/powershell/dllinject/bind_nonx_tcpPowershell Exec, Bind TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/dllinject/bind_tcpPowershell Exec, Bind TCP Stager (Windows x86)
payload/cmd/windows/powershell/dllinject/bind_tcp_rc4Powershell Exec, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/dllinject/bind_tcp_uuidPowershell Exec, Bind TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/dllinject/find_tagPowershell Exec, Find Tag Ordinal Stager
payload/cmd/windows/powershell/dllinject/reverse_hop_httpPowershell Exec, Reverse Hop HTTP/HTTPS Stager
payload/cmd/windows/powershell/dllinject/reverse_httpPowershell Exec, Windows Reverse HTTP Stager (wininet)
payload/cmd/windows/powershell/dllinject/reverse_http_proxy_pstorePowershell Exec, Reverse HTTP Stager Proxy
payload/cmd/windows/powershell/dllinject/reverse_ipv6_tcpPowershell Exec, Reverse TCP Stager (IPv6)
payload/cmd/windows/powershell/dllinject/reverse_nonx_tcpPowershell Exec, Reverse TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/dllinject/reverse_ord_tcpPowershell Exec, Reverse Ordinal TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/dllinject/reverse_tcp_allportsPowershell Exec, Reverse All-Port TCP Stager
payload/cmd/windows/powershell/dllinject/reverse_tcp_dnsPowershell Exec, Reverse TCP Stager (DNS)
payload/cmd/windows/powershell/dllinject/reverse_tcpPowershell Exec, Reverse TCP Stager
payload/cmd/windows/powershell/dllinject/reverse_tcp_rc4_dnsPowershell Exec, Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/cmd/windows/powershell/dllinject/reverse_tcp_rc4Powershell Exec, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/dllinject/reverse_tcp_uuidPowershell Exec, Reverse TCP Stager with UUID Support
payload/cmd/windows/powershell/dllinject/reverse_winhttpPowershell Exec, Windows Reverse HTTP Stager (winhttp)
payload/cmd/windows/powershell/dns_txt_query_execPowershell Exec, DNS TXT Record Payload Download and Execution
payload/cmd/windows/powershell/download_execPowershell Exec, Windows Executable Download (http,https,ftp) and Execute
payload/cmd/windows/powershell/execPowershell Exec
payload/cmd/windows/powershell/format_all_drivesPowershell Exec
payload/cmd/windows/powershell/generic/debug_trapPowershell Exec, Generic x86 Debug Trap
payload/cmd/windows/powershell/generic/tight_loopPowershell Exec, Generic x86 Tight Loop
payload/cmd/windows/powershell/loadlibraryPowershell Exec
payload/cmd/windows/powershell/messageboxPowershell Exec, Windows MessageBox
payload/cmd/windows/powershell/meterpreter/bind_hidden_ipknock_tcpPowershell Exec, Hidden Bind Ipknock TCP Stager
payload/cmd/windows/powershell/meterpreter/bind_hidden_tcpPowershell Exec, Hidden Bind TCP Stager
payload/cmd/windows/powershell/meterpreter/bind_ipv6_tcpPowershell Exec, Bind IPv6 TCP Stager (Windows x86)
payload/cmd/windows/powershell/meterpreter/bind_ipv6_tcp_uuidPowershell Exec, Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/meterpreter/bind_named_pipePowershell Exec, Windows x86 Bind Named Pipe Stager
payload/cmd/windows/powershell/meterpreter/bind_nonx_tcpPowershell Exec, Bind TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/meterpreter/bind_tcpPowershell Exec, Bind TCP Stager (Windows x86)
payload/cmd/windows/powershell/meterpreter/bind_tcp_rc4Powershell Exec, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/meterpreter/bind_tcp_uuidPowershell Exec, Bind TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/meterpreter/find_tagPowershell Exec, Find Tag Ordinal Stager
payload/cmd/windows/powershell/meterpreter/reverse_hop_httpPowershell Exec, Reverse Hop HTTP/HTTPS Stager
payload/cmd/windows/powershell/meterpreter/reverse_httpPowershell Exec, Windows Reverse HTTP Stager (wininet)
payload/cmd/windows/powershell/meterpreter/reverse_http_proxy_pstorePowershell Exec, Reverse HTTP Stager Proxy
payload/cmd/windows/powershell/meterpreter/reverse_httpsPowershell Exec, Windows Reverse HTTPS Stager (wininet)
payload/cmd/windows/powershell/meterpreter/reverse_https_proxyPowershell Exec, Reverse HTTPS Stager with Support for Custom Proxy
payload/cmd/windows/powershell/meterpreter/reverse_ipv6_tcpPowershell Exec, Reverse TCP Stager (IPv6)
payload/cmd/windows/powershell/meterpreter/reverse_named_pipePowershell Exec, Windows x86 Reverse Named Pipe (SMB) Stager
payload/cmd/windows/powershell/meterpreter/reverse_nonx_tcpPowershell Exec, Reverse TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/meterpreter/reverse_ord_tcpPowershell Exec, Reverse Ordinal TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/meterpreter/reverse_tcp_allportsPowershell Exec, Reverse All-Port TCP Stager
payload/cmd/windows/powershell/meterpreter/reverse_tcp_dnsPowershell Exec, Reverse TCP Stager (DNS)
payload/cmd/windows/powershell/meterpreter/reverse_tcpPowershell Exec, Reverse TCP Stager
payload/cmd/windows/powershell/meterpreter/reverse_tcp_rc4_dnsPowershell Exec, Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/cmd/windows/powershell/meterpreter/reverse_tcp_rc4Powershell Exec, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/meterpreter/reverse_tcp_uuidPowershell Exec, Reverse TCP Stager with UUID Support
payload/cmd/windows/powershell/meterpreter/reverse_winhttpPowershell Exec, Windows Reverse HTTP Stager (winhttp)
payload/cmd/windows/powershell/meterpreter/reverse_winhttpsPowershell Exec, Windows Reverse HTTPS Stager (winhttp)
payload/cmd/windows/powershell/metsvc_bind_tcpPowershell Exec, Windows Meterpreter Service, Bind TCP
payload/cmd/windows/powershell/metsvc_reverse_tcpPowershell Exec, Windows Meterpreter Service, Reverse TCP Inline
payload/cmd/windows/powershell/patchupdllinject/bind_hidden_ipknock_tcpPowershell Exec, Hidden Bind Ipknock TCP Stager
payload/cmd/windows/powershell/patchupdllinject/bind_hidden_tcpPowershell Exec, Hidden Bind TCP Stager
payload/cmd/windows/powershell/patchupdllinject/bind_ipv6_tcpPowershell Exec, Bind IPv6 TCP Stager (Windows x86)
payload/cmd/windows/powershell/patchupdllinject/bind_ipv6_tcp_uuidPowershell Exec, Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/patchupdllinject/bind_named_pipePowershell Exec, Windows x86 Bind Named Pipe Stager
payload/cmd/windows/powershell/patchupdllinject/bind_nonx_tcpPowershell Exec, Bind TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/patchupdllinject/bind_tcpPowershell Exec, Bind TCP Stager (Windows x86)
payload/cmd/windows/powershell/patchupdllinject/bind_tcp_rc4Powershell Exec, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/patchupdllinject/bind_tcp_uuidPowershell Exec, Bind TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/patchupdllinject/find_tagPowershell Exec, Find Tag Ordinal Stager
payload/cmd/windows/powershell/patchupdllinject/reverse_ipv6_tcpPowershell Exec, Reverse TCP Stager (IPv6)
payload/cmd/windows/powershell/patchupdllinject/reverse_nonx_tcpPowershell Exec, Reverse TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/patchupdllinject/reverse_ord_tcpPowershell Exec, Reverse Ordinal TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/patchupdllinject/reverse_tcp_allportsPowershell Exec, Reverse All-Port TCP Stager
payload/cmd/windows/powershell/patchupdllinject/reverse_tcp_dnsPowershell Exec, Reverse TCP Stager (DNS)
payload/cmd/windows/powershell/patchupdllinject/reverse_tcpPowershell Exec, Reverse TCP Stager
payload/cmd/windows/powershell/patchupdllinject/reverse_tcp_rc4_dnsPowershell Exec, Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/cmd/windows/powershell/patchupdllinject/reverse_tcp_rc4Powershell Exec, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/patchupdllinject/reverse_tcp_uuidPowershell Exec, Reverse TCP Stager with UUID Support
payload/cmd/windows/powershell/patchupmeterpreter/bind_hidden_ipknock_tcpPowershell Exec, Hidden Bind Ipknock TCP Stager
payload/cmd/windows/powershell/patchupmeterpreter/bind_hidden_tcpPowershell Exec, Hidden Bind TCP Stager
payload/cmd/windows/powershell/patchupmeterpreter/bind_ipv6_tcpPowershell Exec, Bind IPv6 TCP Stager (Windows x86)
payload/cmd/windows/powershell/patchupmeterpreter/bind_ipv6_tcp_uuidPowershell Exec, Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/patchupmeterpreter/bind_named_pipePowershell Exec, Windows x86 Bind Named Pipe Stager
payload/cmd/windows/powershell/patchupmeterpreter/bind_nonx_tcpPowershell Exec, Bind TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/patchupmeterpreter/bind_tcpPowershell Exec, Bind TCP Stager (Windows x86)
payload/cmd/windows/powershell/patchupmeterpreter/bind_tcp_rc4Powershell Exec, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/patchupmeterpreter/bind_tcp_uuidPowershell Exec, Bind TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/patchupmeterpreter/find_tagPowershell Exec, Find Tag Ordinal Stager
payload/cmd/windows/powershell/patchupmeterpreter/reverse_ipv6_tcpPowershell Exec, Reverse TCP Stager (IPv6)
payload/cmd/windows/powershell/patchupmeterpreter/reverse_nonx_tcpPowershell Exec, Reverse TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/patchupmeterpreter/reverse_ord_tcpPowershell Exec, Reverse Ordinal TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/patchupmeterpreter/reverse_tcp_allportsPowershell Exec, Reverse All-Port TCP Stager
payload/cmd/windows/powershell/patchupmeterpreter/reverse_tcp_dnsPowershell Exec, Reverse TCP Stager (DNS)
payload/cmd/windows/powershell/patchupmeterpreter/reverse_tcpPowershell Exec, Reverse TCP Stager
payload/cmd/windows/powershell/patchupmeterpreter/reverse_tcp_rc4_dnsPowershell Exec, Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/cmd/windows/powershell/patchupmeterpreter/reverse_tcp_rc4Powershell Exec, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/patchupmeterpreter/reverse_tcp_uuidPowershell Exec, Reverse TCP Stager with UUID Support
payload/cmd/windows/powershell/peinject/bind_hidden_ipknock_tcpPowershell Exec, Hidden Bind Ipknock TCP Stager
payload/cmd/windows/powershell/peinject/bind_hidden_tcpPowershell Exec, Hidden Bind TCP Stager
payload/cmd/windows/powershell/peinject/bind_ipv6_tcpPowershell Exec, Bind IPv6 TCP Stager (Windows x86)
payload/cmd/windows/powershell/peinject/bind_ipv6_tcp_uuidPowershell Exec, Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/peinject/bind_named_pipePowershell Exec, Windows x86 Bind Named Pipe Stager
payload/cmd/windows/powershell/peinject/bind_nonx_tcpPowershell Exec, Bind TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/peinject/bind_tcpPowershell Exec, Bind TCP Stager (Windows x86)
payload/cmd/windows/powershell/peinject/bind_tcp_rc4Powershell Exec, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/peinject/bind_tcp_uuidPowershell Exec, Bind TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/peinject/find_tagPowershell Exec, Find Tag Ordinal Stager
payload/cmd/windows/powershell/peinject/reverse_ipv6_tcpPowershell Exec, Reverse TCP Stager (IPv6)
payload/cmd/windows/powershell/peinject/reverse_named_pipePowershell Exec, Windows x86 Reverse Named Pipe (SMB) Stager
payload/cmd/windows/powershell/peinject/reverse_nonx_tcpPowershell Exec, Reverse TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/peinject/reverse_ord_tcpPowershell Exec, Reverse Ordinal TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/peinject/reverse_tcp_allportsPowershell Exec, Reverse All-Port TCP Stager
payload/cmd/windows/powershell/peinject/reverse_tcp_dnsPowershell Exec, Reverse TCP Stager (DNS)
payload/cmd/windows/powershell/peinject/reverse_tcpPowershell Exec, Reverse TCP Stager
payload/cmd/windows/powershell/peinject/reverse_tcp_rc4_dnsPowershell Exec, Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/cmd/windows/powershell/peinject/reverse_tcp_rc4Powershell Exec, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/peinject/reverse_tcp_uuidPowershell Exec, Reverse TCP Stager with UUID Support
payload/cmd/windows/powershell/pingback_bind_tcpPowershell Exec, Windows x86 Pingback, Bind TCP Inline
payload/cmd/windows/powershell/pingback_reverse_tcpPowershell Exec, Windows x86 Pingback, Reverse TCP Inline
payload/cmd/windows/powershell/powershell_bind_tcpPowershell Exec
payload/cmd/windows/powershell/powershell_reverse_tcpPowershell Exec
payload/cmd/windows/powershell/powershell_reverse_tcp_sslPowershell Exec
payload/cmd/windows/powershell_reverse_tcpWindows Interactive Powershell Session, Reverse TCP
payload/cmd/windows/powershell_reverse_tcp_sslWindows Interactive Powershell Session, Reverse TCP SSL
payload/cmd/windows/powershell/shell/bind_hidden_ipknock_tcpPowershell Exec, Windows Command Shell, Hidden Bind Ipknock TCP Stager
payload/cmd/windows/powershell/shell/bind_hidden_tcpPowershell Exec, Windows Command Shell, Hidden Bind TCP Stager
payload/cmd/windows/powershell/shell/bind_ipv6_tcpPowershell Exec, Windows Command Shell, Bind IPv6 TCP Stager (Windows x86)
payload/cmd/windows/powershell/shell/bind_ipv6_tcp_uuidPowershell Exec, Windows Command Shell, Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/shell/bind_named_pipePowershell Exec, Windows Command Shell, Windows x86 Bind Named Pipe Stager
payload/cmd/windows/powershell/shell/bind_nonx_tcpPowershell Exec, Windows Command Shell, Bind TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/shell/bind_tcpPowershell Exec, Windows Command Shell, Bind TCP Stager (Windows x86)
payload/cmd/windows/powershell/shell_bind_tcpPowershell Exec, Windows Command Shell, Bind TCP Inline
payload/cmd/windows/powershell/shell/bind_tcp_rc4Powershell Exec, Windows Command Shell, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/shell/bind_tcp_uuidPowershell Exec, Windows Command Shell, Bind TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/shell_bind_tcp_xpfwPowershell Exec, Windows Disable Windows ICF, Command Shell, Bind TCP Inline
payload/cmd/windows/powershell/shell/find_tagPowershell Exec, Windows Command Shell, Find Tag Ordinal Stager
payload/cmd/windows/powershell/shell_hidden_bind_tcpPowershell Exec, Windows Command Shell, Hidden Bind TCP Inline
payload/cmd/windows/powershell/shell/reverse_ipv6_tcpPowershell Exec, Windows Command Shell, Reverse TCP Stager (IPv6)
payload/cmd/windows/powershell/shell/reverse_nonx_tcpPowershell Exec, Windows Command Shell, Reverse TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/shell/reverse_ord_tcpPowershell Exec, Windows Command Shell, Reverse Ordinal TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/shell/reverse_tcp_allportsPowershell Exec, Windows Command Shell, Reverse All-Port TCP Stager
payload/cmd/windows/powershell/shell/reverse_tcp_dnsPowershell Exec, Windows Command Shell, Reverse TCP Stager (DNS)
payload/cmd/windows/powershell/shell/reverse_tcpPowershell Exec, Windows Command Shell, Reverse TCP Stager
payload/cmd/windows/powershell/shell_reverse_tcpPowershell Exec, Windows Command Shell, Reverse TCP Inline
payload/cmd/windows/powershell/shell/reverse_tcp_rc4_dnsPowershell Exec, Windows Command Shell, Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/cmd/windows/powershell/shell/reverse_tcp_rc4Powershell Exec, Windows Command Shell, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/shell/reverse_tcp_uuidPowershell Exec, Windows Command Shell, Reverse TCP Stager with UUID Support
payload/cmd/windows/powershell/shell/reverse_udpPowershell Exec, Windows Command Shell, Reverse UDP Stager with UUID Support
payload/cmd/windows/powershell/speak_pwnedPowershell Exec
payload/cmd/windows/powershell/upexec/bind_hidden_ipknock_tcpPowershell Exec, Windows Upload/Execute, Hidden Bind Ipknock TCP Stager
payload/cmd/windows/powershell/upexec/bind_hidden_tcpPowershell Exec, Windows Upload/Execute, Hidden Bind TCP Stager
payload/cmd/windows/powershell/upexec/bind_ipv6_tcpPowershell Exec, Windows Upload/Execute, Bind IPv6 TCP Stager (Windows x86)
payload/cmd/windows/powershell/upexec/bind_ipv6_tcp_uuidPowershell Exec, Windows Upload/Execute, Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/upexec/bind_named_pipePowershell Exec, Windows Upload/Execute, Windows x86 Bind Named Pipe Stager
payload/cmd/windows/powershell/upexec/bind_nonx_tcpPowershell Exec, Windows Upload/Execute, Bind TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/upexec/bind_tcpPowershell Exec, Windows Upload/Execute, Bind TCP Stager (Windows x86)
payload/cmd/windows/powershell/upexec/bind_tcp_rc4Powershell Exec, Windows Upload/Execute, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/upexec/bind_tcp_uuidPowershell Exec, Windows Upload/Execute, Bind TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/upexec/find_tagPowershell Exec, Windows Upload/Execute, Find Tag Ordinal Stager
payload/cmd/windows/powershell/upexec/reverse_ipv6_tcpPowershell Exec, Windows Upload/Execute, Reverse TCP Stager (IPv6)
payload/cmd/windows/powershell/upexec/reverse_nonx_tcpPowershell Exec, Windows Upload/Execute, Reverse TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/upexec/reverse_ord_tcpPowershell Exec, Windows Upload/Execute, Reverse Ordinal TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/upexec/reverse_tcp_allportsPowershell Exec, Windows Upload/Execute, Reverse All-Port TCP Stager
payload/cmd/windows/powershell/upexec/reverse_tcp_dnsPowershell Exec, Windows Upload/Execute, Reverse TCP Stager (DNS)
payload/cmd/windows/powershell/upexec/reverse_tcpPowershell Exec, Windows Upload/Execute, Reverse TCP Stager
payload/cmd/windows/powershell/upexec/reverse_tcp_rc4_dnsPowershell Exec, Windows Upload/Execute, Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/cmd/windows/powershell/upexec/reverse_tcp_rc4Powershell Exec, Windows Upload/Execute, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/upexec/reverse_tcp_uuidPowershell Exec, Windows Upload/Execute, Reverse TCP Stager with UUID Support
payload/cmd/windows/powershell/upexec/reverse_udpPowershell Exec, Windows Upload/Execute, Reverse UDP Stager with UUID Support
payload/cmd/windows/powershell/vncinject/bind_hidden_ipknock_tcpPowershell Exec, Hidden Bind Ipknock TCP Stager
payload/cmd/windows/powershell/vncinject/bind_hidden_tcpPowershell Exec, Hidden Bind TCP Stager
payload/cmd/windows/powershell/vncinject/bind_ipv6_tcpPowershell Exec, Bind IPv6 TCP Stager (Windows x86)
payload/cmd/windows/powershell/vncinject/bind_ipv6_tcp_uuidPowershell Exec, Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/vncinject/bind_named_pipePowershell Exec, Windows x86 Bind Named Pipe Stager
payload/cmd/windows/powershell/vncinject/bind_nonx_tcpPowershell Exec, Bind TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/vncinject/bind_tcpPowershell Exec, Bind TCP Stager (Windows x86)
payload/cmd/windows/powershell/vncinject/bind_tcp_rc4Powershell Exec, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/vncinject/bind_tcp_uuidPowershell Exec, Bind TCP Stager with UUID Support (Windows x86)
payload/cmd/windows/powershell/vncinject/find_tagPowershell Exec, Find Tag Ordinal Stager
payload/cmd/windows/powershell/vncinject/reverse_hop_httpPowershell Exec, Reverse Hop HTTP/HTTPS Stager
payload/cmd/windows/powershell/vncinject/reverse_httpPowershell Exec, Windows Reverse HTTP Stager (wininet)
payload/cmd/windows/powershell/vncinject/reverse_http_proxy_pstorePowershell Exec, Reverse HTTP Stager Proxy
payload/cmd/windows/powershell/vncinject/reverse_ipv6_tcpPowershell Exec, Reverse TCP Stager (IPv6)
payload/cmd/windows/powershell/vncinject/reverse_nonx_tcpPowershell Exec, Reverse TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/vncinject/reverse_ord_tcpPowershell Exec, Reverse Ordinal TCP Stager (No NX or Win7)
payload/cmd/windows/powershell/vncinject/reverse_tcp_allportsPowershell Exec, Reverse All-Port TCP Stager
payload/cmd/windows/powershell/vncinject/reverse_tcp_dnsPowershell Exec, Reverse TCP Stager (DNS)
payload/cmd/windows/powershell/vncinject/reverse_tcpPowershell Exec, Reverse TCP Stager
payload/cmd/windows/powershell/vncinject/reverse_tcp_rc4_dnsPowershell Exec, Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/cmd/windows/powershell/vncinject/reverse_tcp_rc4Powershell Exec, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/vncinject/reverse_tcp_uuidPowershell Exec, Reverse TCP Stager with UUID Support
payload/cmd/windows/powershell/vncinject/reverse_winhttpPowershell Exec, Windows Reverse HTTP Stager (winhttp)
payload/cmd/windows/powershell/x64/custom/bind_ipv6_tcpPowershell Exec, Windows shellcode stage, Windows x64 IPv6 Bind TCP Stager
payload/cmd/windows/powershell/x64/custom/bind_ipv6_tcp_uuidPowershell Exec, Windows shellcode stage, Windows x64 IPv6 Bind TCP Stager with UUID Support
payload/cmd/windows/powershell/x64/custom/bind_named_pipePowershell Exec, Windows shellcode stage, Windows x64 Bind Named Pipe Stager
payload/cmd/windows/powershell/x64/custom/bind_tcpPowershell Exec, Windows shellcode stage, Windows x64 Bind TCP Stager
payload/cmd/windows/powershell/x64/custom/bind_tcp_rc4Powershell Exec, Windows shellcode stage, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/x64/custom/bind_tcp_uuidPowershell Exec, Windows shellcode stage, Bind TCP Stager with UUID Support (Windows x64)
payload/cmd/windows/powershell/x64/custom/reverse_httpPowershell Exec, Windows shellcode stage, Windows x64 Reverse HTTP Stager (wininet)
payload/cmd/windows/powershell/x64/custom/reverse_httpsPowershell Exec, Windows shellcode stage, Windows x64 Reverse HTTP Stager (wininet)
payload/cmd/windows/powershell/x64/custom/reverse_named_pipePowershell Exec, Windows shellcode stage, Windows x64 Reverse Named Pipe (SMB) Stager
payload/cmd/windows/powershell/x64/custom/reverse_tcpPowershell Exec, Windows shellcode stage, Windows x64 Reverse TCP Stager
payload/cmd/windows/powershell/x64/custom/reverse_tcp_rc4Powershell Exec, Windows shellcode stage, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/x64/custom/reverse_tcp_uuidPowershell Exec, Windows shellcode stage, Reverse TCP Stager with UUID Support (Windows x64)
payload/cmd/windows/powershell/x64/custom/reverse_winhttpPowershell Exec, Windows shellcode stage, Windows x64 Reverse HTTP Stager (winhttp)
payload/cmd/windows/powershell/x64/custom/reverse_winhttpsPowershell Exec, Windows shellcode stage, Windows x64 Reverse HTTPS Stager (winhttp)
payload/cmd/windows/powershell/x64/execPowershell Exec, Windows x64 Execute Command
payload/cmd/windows/powershell/x64/loadlibraryPowershell Exec, Windows x64 LoadLibrary Path
payload/cmd/windows/powershell/x64/messageboxPowershell Exec, Windows MessageBox x64
payload/cmd/windows/powershell/x64/meterpreter/bind_ipv6_tcpPowershell Exec, Windows x64 IPv6 Bind TCP Stager
payload/cmd/windows/powershell/x64/meterpreter/bind_ipv6_tcp_uuidPowershell Exec, Windows x64 IPv6 Bind TCP Stager with UUID Support
payload/cmd/windows/powershell/x64/meterpreter/bind_named_pipePowershell Exec, Windows x64 Bind Named Pipe Stager
payload/cmd/windows/powershell/x64/meterpreter/bind_tcpPowershell Exec, Windows x64 Bind TCP Stager
payload/cmd/windows/powershell/x64/meterpreter/bind_tcp_rc4Powershell Exec, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/x64/meterpreter/bind_tcp_uuidPowershell Exec, Bind TCP Stager with UUID Support (Windows x64)
payload/cmd/windows/powershell/x64/meterpreter/reverse_httpPowershell Exec, Windows x64 Reverse HTTP Stager (wininet)
payload/cmd/windows/powershell/x64/meterpreter/reverse_httpsPowershell Exec, Windows x64 Reverse HTTP Stager (wininet)
payload/cmd/windows/powershell/x64/meterpreter/reverse_named_pipePowershell Exec, Windows x64 Reverse Named Pipe (SMB) Stager
payload/cmd/windows/powershell/x64/meterpreter/reverse_tcpPowershell Exec, Windows x64 Reverse TCP Stager
payload/cmd/windows/powershell/x64/meterpreter/reverse_tcp_rc4Powershell Exec, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/x64/meterpreter/reverse_tcp_uuidPowershell Exec, Reverse TCP Stager with UUID Support (Windows x64)
payload/cmd/windows/powershell/x64/meterpreter/reverse_winhttpPowershell Exec, Windows x64 Reverse HTTP Stager (winhttp)
payload/cmd/windows/powershell/x64/meterpreter/reverse_winhttpsPowershell Exec, Windows x64 Reverse HTTPS Stager (winhttp)
payload/cmd/windows/powershell/x64/peinject/bind_ipv6_tcpPowershell Exec, Windows x64 IPv6 Bind TCP Stager
payload/cmd/windows/powershell/x64/peinject/bind_ipv6_tcp_uuidPowershell Exec, Windows x64 IPv6 Bind TCP Stager with UUID Support
payload/cmd/windows/powershell/x64/peinject/bind_named_pipePowershell Exec, Windows x64 Bind Named Pipe Stager
payload/cmd/windows/powershell/x64/peinject/bind_tcpPowershell Exec, Windows x64 Bind TCP Stager
payload/cmd/windows/powershell/x64/peinject/bind_tcp_rc4Powershell Exec, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/x64/peinject/bind_tcp_uuidPowershell Exec, Bind TCP Stager with UUID Support (Windows x64)
payload/cmd/windows/powershell/x64/peinject/reverse_named_pipePowershell Exec, Windows x64 Reverse Named Pipe (SMB) Stager
payload/cmd/windows/powershell/x64/peinject/reverse_tcpPowershell Exec, Windows x64 Reverse TCP Stager
payload/cmd/windows/powershell/x64/peinject/reverse_tcp_rc4Powershell Exec, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/x64/peinject/reverse_tcp_uuidPowershell Exec, Reverse TCP Stager with UUID Support (Windows x64)
payload/cmd/windows/powershell/x64/pingback_reverse_tcpPowershell Exec, Windows x64 Pingback, Reverse TCP Inline
payload/cmd/windows/powershell/x64/powershell_bind_tcpPowershell Exec
payload/cmd/windows/powershell/x64/powershell_reverse_tcpPowershell Exec
payload/cmd/windows/powershell/x64/powershell_reverse_tcp_sslPowershell Exec
payload/cmd/windows/powershell/x64/shell/bind_ipv6_tcpPowershell Exec, Windows x64 Command Shell, Windows x64 IPv6 Bind TCP Stager
payload/cmd/windows/powershell/x64/shell/bind_ipv6_tcp_uuidPowershell Exec, Windows x64 Command Shell, Windows x64 IPv6 Bind TCP Stager with UUID Support
payload/cmd/windows/powershell/x64/shell/bind_named_pipePowershell Exec, Windows x64 Command Shell, Windows x64 Bind Named Pipe Stager
payload/cmd/windows/powershell/x64/shell/bind_tcpPowershell Exec, Windows x64 Command Shell, Windows x64 Bind TCP Stager
payload/cmd/windows/powershell/x64/shell_bind_tcpPowershell Exec, Windows x64 Command Shell, Bind TCP Inline
payload/cmd/windows/powershell/x64/shell/bind_tcp_rc4Powershell Exec, Windows x64 Command Shell, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/x64/shell/bind_tcp_uuidPowershell Exec, Windows x64 Command Shell, Bind TCP Stager with UUID Support (Windows x64)
payload/cmd/windows/powershell/x64/shell/reverse_tcpPowershell Exec, Windows x64 Command Shell, Windows x64 Reverse TCP Stager
payload/cmd/windows/powershell/x64/shell_reverse_tcpPowershell Exec, Windows x64 Command Shell, Reverse TCP Inline
payload/cmd/windows/powershell/x64/shell/reverse_tcp_rc4Powershell Exec, Windows x64 Command Shell, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/x64/shell/reverse_tcp_uuidPowershell Exec, Windows x64 Command Shell, Reverse TCP Stager with UUID Support (Windows x64)
payload/cmd/windows/powershell/x64/vncinject/bind_ipv6_tcpPowershell Exec, Windows x64 IPv6 Bind TCP Stager
payload/cmd/windows/powershell/x64/vncinject/bind_ipv6_tcp_uuidPowershell Exec, Windows x64 IPv6 Bind TCP Stager with UUID Support
payload/cmd/windows/powershell/x64/vncinject/bind_named_pipePowershell Exec, Windows x64 Bind Named Pipe Stager
payload/cmd/windows/powershell/x64/vncinject/bind_tcpPowershell Exec, Windows x64 Bind TCP Stager
payload/cmd/windows/powershell/x64/vncinject/bind_tcp_rc4Powershell Exec, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/x64/vncinject/bind_tcp_uuidPowershell Exec, Bind TCP Stager with UUID Support (Windows x64)
payload/cmd/windows/powershell/x64/vncinject/reverse_httpPowershell Exec, Windows x64 Reverse HTTP Stager (wininet)
payload/cmd/windows/powershell/x64/vncinject/reverse_httpsPowershell Exec, Windows x64 Reverse HTTP Stager (wininet)
payload/cmd/windows/powershell/x64/vncinject/reverse_tcpPowershell Exec, Windows x64 Reverse TCP Stager
payload/cmd/windows/powershell/x64/vncinject/reverse_tcp_rc4Powershell Exec, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/cmd/windows/powershell/x64/vncinject/reverse_tcp_uuidPowershell Exec, Reverse TCP Stager with UUID Support (Windows x64)
payload/cmd/windows/powershell/x64/vncinject/reverse_winhttpPowershell Exec, Windows x64 Reverse HTTP Stager (winhttp)
payload/cmd/windows/powershell/x64/vncinject/reverse_winhttpsPowershell Exec, Windows x64 Reverse HTTPS Stager (winhttp)
payload/cmd/windows/reverse_luaWindows Command Shell, Reverse TCP (via Lua)
payload/cmd/windows/reverse_perlWindows Command, Double Reverse TCP Connection (via Perl)
payload/cmd/windows/reverse_powershellWindows Command Shell, Reverse TCP (via Powershell)
payload/cmd/windows/reverse_rubyWindows Command Shell, Reverse TCP (via Ruby)
payload/firefox/execFirefox XPCOM Execute Command
payload/firefox/shell_bind_tcpCommand Shell, Bind TCP (via Firefox XPCOM script)
payload/firefox/shell_reverse_tcpCommand Shell, Reverse TCP (via Firefox XPCOM script)
payload/generic/customCustom Payload
payload/generic/debug_trapGeneric x86 Debug Trap
payload/generic/shell_bind_tcpGeneric Command Shell, Bind TCP Inline
payload/generic/shell_reverse_tcpGeneric Command Shell, Reverse TCP Inline
payload/generic/ssh/interactInteract with Established SSH Connection
payload/generic/tight_loopGeneric x86 Tight Loop
payload/java/jsp_shell_bind_tcpJava JSP Command Shell, Bind TCP Inline
payload/java/jsp_shell_reverse_tcpJava JSP Command Shell, Reverse TCP Inline
payload/java/meterpreter/bind_tcpJava Meterpreter, Java Bind TCP Stager
payload/java/meterpreter/reverse_httpJava Meterpreter, Java Reverse HTTP Stager
payload/java/meterpreter/reverse_httpsJava Meterpreter, Java Reverse HTTPS Stager
payload/java/meterpreter/reverse_tcpJava Meterpreter, Java Reverse TCP Stager
payload/java/shell/bind_tcpCommand Shell, Java Bind TCP Stager
payload/java/shell/reverse_tcpCommand Shell, Java Reverse TCP Stager
payload/java/shell_reverse_tcpJava Command Shell, Reverse TCP Inline
payload/linux/aarch64/meterpreter_reverse_httpLinux Meterpreter, Reverse HTTP Inline
payload/linux/aarch64/meterpreter_reverse_httpsLinux Meterpreter, Reverse HTTPS Inline
payload/linux/aarch64/meterpreter/reverse_tcpLinux Meterpreter, Reverse TCP Stager
payload/linux/aarch64/meterpreter_reverse_tcpLinux Meterpreter, Reverse TCP Inline
payload/linux/aarch64/shell/reverse_tcpLinux dup2 Command Shell, Reverse TCP Stager
payload/linux/aarch64/shell_reverse_tcpLinux Command Shell, Reverse TCP Inline
payload/linux/armbe/meterpreter_reverse_httpLinux Meterpreter, Reverse HTTP Inline
payload/linux/armbe/meterpreter_reverse_httpsLinux Meterpreter, Reverse HTTPS Inline
payload/linux/armbe/meterpreter_reverse_tcpLinux Meterpreter, Reverse TCP Inline
payload/linux/armbe/shell_bind_tcpLinux ARM Big Endian Command Shell, Bind TCP Inline
payload/linux/armle/adduserLinux Add User
payload/linux/armle/execLinux Execute Command
payload/linux/armle/meterpreter/bind_tcpLinux Meterpreter, Bind TCP Stager
payload/linux/armle/meterpreter_reverse_httpLinux Meterpreter, Reverse HTTP Inline
payload/linux/armle/meterpreter_reverse_httpsLinux Meterpreter, Reverse HTTPS Inline
payload/linux/armle/meterpreter/reverse_tcpLinux Meterpreter, Reverse TCP Stager
payload/linux/armle/meterpreter_reverse_tcpLinux Meterpreter, Reverse TCP Inline
payload/linux/armle/shell/bind_tcpLinux dup2 Command Shell, Bind TCP Stager
payload/linux/armle/shell_bind_tcpLinux Command Shell, Reverse TCP Inline
payload/linux/armle/shell/reverse_tcpLinux dup2 Command Shell, Reverse TCP Stager
payload/linux/armle/shell_reverse_tcpLinux Command Shell, Reverse TCP Inline
payload/linux/mips64/meterpreter_reverse_httpLinux Meterpreter, Reverse HTTP Inline
payload/linux/mips64/meterpreter_reverse_httpsLinux Meterpreter, Reverse HTTPS Inline
payload/linux/mips64/meterpreter_reverse_tcpLinux Meterpreter, Reverse TCP Inline
payload/linux/mipsbe/execLinux Execute Command
payload/linux/mipsbe/meterpreter_reverse_httpLinux Meterpreter, Reverse HTTP Inline
payload/linux/mipsbe/meterpreter_reverse_httpsLinux Meterpreter, Reverse HTTPS Inline
payload/linux/mipsbe/meterpreter/reverse_tcpLinux Meterpreter, Reverse TCP Stager
payload/linux/mipsbe/meterpreter_reverse_tcpLinux Meterpreter, Reverse TCP Inline
payload/linux/mipsbe/rebootLinux Reboot
payload/linux/mipsbe/shell_bind_tcpLinux Command Shell, Bind TCP Inline
payload/linux/mipsbe/shell/reverse_tcpLinux Command Shell, Reverse TCP Stager
payload/linux/mipsbe/shell_reverse_tcpLinux Command Shell, Reverse TCP Inline
payload/linux/mipsle/execLinux Execute Command
payload/linux/mipsle/meterpreter_reverse_httpLinux Meterpreter, Reverse HTTP Inline
payload/linux/mipsle/meterpreter_reverse_httpsLinux Meterpreter, Reverse HTTPS Inline
payload/linux/mipsle/meterpreter/reverse_tcpLinux Meterpreter, Reverse TCP Stager
payload/linux/mipsle/meterpreter_reverse_tcpLinux Meterpreter, Reverse TCP Inline
payload/linux/mipsle/rebootLinux Reboot
payload/linux/mipsle/shell_bind_tcpLinux Command Shell, Bind TCP Inline
payload/linux/mipsle/shell/reverse_tcpLinux Command Shell, Reverse TCP Stager
payload/linux/mipsle/shell_reverse_tcpLinux Command Shell, Reverse TCP Inline
payload/linux/ppc64le/meterpreter_reverse_httpLinux Meterpreter, Reverse HTTP Inline
payload/linux/ppc64le/meterpreter_reverse_httpsLinux Meterpreter, Reverse HTTPS Inline
payload/linux/ppc64le/meterpreter_reverse_tcpLinux Meterpreter, Reverse TCP Inline
payload/linux/ppc64/shell_bind_tcpLinux Command Shell, Bind TCP Inline
payload/linux/ppc64/shell_find_portLinux Command Shell, Find Port Inline
payload/linux/ppc64/shell_reverse_tcpLinux Command Shell, Reverse TCP Inline
payload/linux/ppce500v2/meterpreter_reverse_httpLinux Meterpreter, Reverse HTTP Inline
payload/linux/ppce500v2/meterpreter_reverse_httpsLinux Meterpreter, Reverse HTTPS Inline
payload/linux/ppce500v2/meterpreter_reverse_tcpLinux Meterpreter, Reverse TCP Inline
payload/linux/ppc/meterpreter_reverse_httpLinux Meterpreter, Reverse HTTP Inline
payload/linux/ppc/meterpreter_reverse_httpsLinux Meterpreter, Reverse HTTPS Inline
payload/linux/ppc/meterpreter_reverse_tcpLinux Meterpreter, Reverse TCP Inline
payload/linux/ppc/shell_bind_tcpLinux Command Shell, Bind TCP Inline
payload/linux/ppc/shell_find_portLinux Command Shell, Find Port Inline
payload/linux/ppc/shell_reverse_tcpLinux Command Shell, Reverse TCP Inline
payload/linux/x64/execLinux Execute Command
payload/linux/x64/meterpreter/bind_tcpLinux Mettle x64, Bind TCP Stager
payload/linux/x64/meterpreter_reverse_httpLinux Meterpreter, Reverse HTTP Inline
payload/linux/x64/meterpreter_reverse_httpsLinux Meterpreter, Reverse HTTPS Inline
payload/linux/x64/meterpreter/reverse_tcpLinux Mettle x64, Reverse TCP Stager
payload/linux/x64/meterpreter_reverse_tcpLinux Meterpreter, Reverse TCP Inline
payload/linux/x64/pingback_bind_tcpLinux x64 Pingback, Bind TCP Inline
payload/linux/x64/pingback_reverse_tcpLinux x64 Pingback, Reverse TCP Inline
payload/linux/x64/shell_bind_ipv6_tcpLinux x64 Command Shell, Bind TCP Inline (IPv6)
payload/linux/x64/shell/bind_tcpLinux Command Shell, Bind TCP Stager
payload/linux/x64/shell_bind_tcpLinux Command Shell, Bind TCP Inline
payload/linux/x64/shell_bind_tcp_random_portLinux Command Shell, Bind TCP Random Port Inline
payload/linux/x64/shell_find_portLinux Command Shell, Find Port Inline
payload/linux/x64/shell_reverse_ipv6_tcpLinux x64 Command Shell, Reverse TCP Inline (IPv6)
payload/linux/x64/shell/reverse_tcpLinux Command Shell, Reverse TCP Stager
payload/linux/x64/shell_reverse_tcpLinux Command Shell, Reverse TCP Inline
payload/linux/x86/adduserLinux Add User
payload/linux/x86/chmodLinux Chmod
payload/linux/x86/execLinux Execute Command
payload/linux/x86/meterpreter/bind_ipv6_tcpLinux Mettle x86, Bind IPv6 TCP Stager (Linux x86)
payload/linux/x86/meterpreter/bind_ipv6_tcp_uuidLinux Mettle x86, Bind IPv6 TCP Stager with UUID Support (Linux x86)
payload/linux/x86/meterpreter/bind_nonx_tcpLinux Mettle x86, Bind TCP Stager
payload/linux/x86/meterpreter/bind_tcpLinux Mettle x86, Bind TCP Stager (Linux x86)
payload/linux/x86/meterpreter/bind_tcp_uuidLinux Mettle x86, Bind TCP Stager with UUID Support (Linux x86)
payload/linux/x86/meterpreter/find_tagLinux Mettle x86, Find Tag Stager
payload/linux/x86/meterpreter_reverse_httpLinux Meterpreter, Reverse HTTP Inline
payload/linux/x86/meterpreter_reverse_httpsLinux Meterpreter, Reverse HTTPS Inline
payload/linux/x86/meterpreter/reverse_ipv6_tcpLinux Mettle x86, Reverse TCP Stager (IPv6)
payload/linux/x86/meterpreter/reverse_nonx_tcpLinux Mettle x86, Reverse TCP Stager
payload/linux/x86/meterpreter/reverse_tcpLinux Mettle x86, Reverse TCP Stager
payload/linux/x86/meterpreter_reverse_tcpLinux Meterpreter, Reverse TCP Inline
payload/linux/x86/meterpreter/reverse_tcp_uuidLinux Mettle x86, Reverse TCP Stager
payload/linux/x86/metsvc_bind_tcpLinux Meterpreter Service, Bind TCP
payload/linux/x86/metsvc_reverse_tcpLinux Meterpreter Service, Reverse TCP Inline
payload/linux/x86/read_fileLinux Read File
payload/linux/x86/shell/bind_ipv6_tcpLinux Command Shell, Bind IPv6 TCP Stager (Linux x86)
payload/linux/x86/shell_bind_ipv6_tcpLinux Command Shell, Bind TCP Inline (IPv6)
payload/linux/x86/shell/bind_ipv6_tcp_uuidLinux Command Shell, Bind IPv6 TCP Stager with UUID Support (Linux x86)
payload/linux/x86/shell/bind_nonx_tcpLinux Command Shell, Bind TCP Stager
payload/linux/x86/shell/bind_tcpLinux Command Shell, Bind TCP Stager (Linux x86)
payload/linux/x86/shell_bind_tcpLinux Command Shell, Bind TCP Inline
payload/linux/x86/shell_bind_tcp_random_portLinux Command Shell, Bind TCP Random Port Inline
payload/linux/x86/shell/bind_tcp_uuidLinux Command Shell, Bind TCP Stager with UUID Support (Linux x86)
payload/linux/x86/shell_find_portLinux Command Shell, Find Port Inline
payload/linux/x86/shell/find_tagLinux Command Shell, Find Tag Stager
payload/linux/x86/shell_find_tagLinux Command Shell, Find Tag Inline
payload/linux/x86/shell/reverse_ipv6_tcpLinux Command Shell, Reverse TCP Stager (IPv6)
payload/linux/x86/shell/reverse_nonx_tcpLinux Command Shell, Reverse TCP Stager
payload/linux/x86/shell/reverse_tcpLinux Command Shell, Reverse TCP Stager
payload/linux/x86/shell_reverse_tcpLinux Command Shell, Reverse TCP Inline
payload/linux/x86/shell_reverse_tcp_ipv6Linux Command Shell, Reverse TCP Inline (IPv6)
payload/linux/x86/shell/reverse_tcp_uuidLinux Command Shell, Reverse TCP Stager
payload/linux/zarch/meterpreter_reverse_httpLinux Meterpreter, Reverse HTTP Inline
payload/linux/zarch/meterpreter_reverse_httpsLinux Meterpreter, Reverse HTTPS Inline
payload/linux/zarch/meterpreter_reverse_tcpLinux Meterpreter, Reverse TCP Inline
payload/mainframe/shell_reverse_tcpZ/OS (MVS) Command Shell, Reverse TCP Inline
payload/multi/meterpreter/reverse_httpArchitecture-Independent Meterpreter Stage, Reverse HTTP Stager (Multiple Architectures)
payload/multi/meterpreter/reverse_httpsArchitecture-Independent Meterpreter Stage, Reverse HTTPS Stager (Multiple Architectures)
payload/netware/shell/reverse_tcpNetWare Command Shell, Reverse TCP Stager
payload/nodejs/shell_bind_tcpCommand Shell, Bind TCP (via nodejs)
payload/nodejs/shell_reverse_tcpCommand Shell, Reverse TCP (via nodejs)
payload/nodejs/shell_reverse_tcp_sslCommand Shell, Reverse TCP SSL (via nodejs)
payload/osx/armle/execute/bind_tcpOS X Write and Execute Binary, Bind TCP Stager
payload/osx/armle/execute/reverse_tcpOS X Write and Execute Binary, Reverse TCP Stager
payload/osx/armle/shell/bind_tcpOS X Command Shell, Bind TCP Stager
payload/osx/armle/shell_bind_tcpApple iOS Command Shell, Bind TCP Inline
payload/osx/armle/shell/reverse_tcpOS X Command Shell, Reverse TCP Stager
payload/osx/armle/shell_reverse_tcpApple iOS Command Shell, Reverse TCP Inline
payload/osx/armle/vibrateApple iOS iPhone Vibrate
payload/osx/ppc/shell/bind_tcpOS X Command Shell, Bind TCP Stager
payload/osx/ppc/shell_bind_tcpOS X Command Shell, Bind TCP Inline
payload/osx/ppc/shell/find_tagOS X Command Shell, Find Tag Stager
payload/osx/ppc/shell/reverse_tcpOS X Command Shell, Reverse TCP Stager
payload/osx/ppc/shell_reverse_tcpOS X Command Shell, Reverse TCP Inline
payload/osx/x64/dupandexecve/bind_tcpOS X dup2 Command Shell, Bind TCP Stager
payload/osx/x64/dupandexecve/reverse_tcpOS X dup2 Command Shell, Reverse TCP Stager
payload/osx/x64/dupandexecve/reverse_tcp_uuidOS X dup2 Command Shell, Reverse TCP Stager with UUID Support (OSX x64)
payload/osx/x64/execOS X x64 Execute Command
payload/osx/x64/meterpreter/bind_tcpOSX Meterpreter, Bind TCP Stager
payload/osx/x64/meterpreter_reverse_httpOSX Meterpreter, Reverse HTTP Inline
payload/osx/x64/meterpreter_reverse_httpsOSX Meterpreter, Reverse HTTPS Inline
payload/osx/x64/meterpreter/reverse_tcpOSX Meterpreter, Reverse TCP Stager
payload/osx/x64/meterpreter_reverse_tcpOSX Meterpreter, Reverse TCP Inline
payload/osx/x64/meterpreter/reverse_tcp_uuidOSX Meterpreter, Reverse TCP Stager with UUID Support (OSX x64)
payload/osx/x64/sayOS X x64 say Shellcode
payload/osx/x64/shell_bind_tcpOS X x64 Shell Bind TCP
payload/osx/x64/shell_find_tagOSX Command Shell, Find Tag Inline
payload/osx/x64/shell_reverse_tcpOS X x64 Shell Reverse TCP
payload/osx/x86/bundleinject/bind_tcpMac OS X Inject Mach-O Bundle, Bind TCP Stager
payload/osx/x86/bundleinject/reverse_tcpMac OS X Inject Mach-O Bundle, Reverse TCP Stager
payload/osx/x86/execOS X Execute Command
payload/osx/x86/isight/bind_tcpMac OS X x86 iSight Photo Capture, Bind TCP Stager
payload/osx/x86/isight/reverse_tcpMac OS X x86 iSight Photo Capture, Reverse TCP Stager
payload/osx/x86/shell_bind_tcpOS X Command Shell, Bind TCP Inline
payload/osx/x86/shell_find_portOS X Command Shell, Find Port Inline
payload/osx/x86/shell_reverse_tcpOS X Command Shell, Reverse TCP Inline
payload/osx/x86/vforkshell/bind_tcpOS X (vfork) Command Shell, Bind TCP Stager
payload/osx/x86/vforkshell_bind_tcpOS X (vfork) Command Shell, Bind TCP Inline
payload/osx/x86/vforkshell/reverse_tcpOS X (vfork) Command Shell, Reverse TCP Stager
payload/osx/x86/vforkshell_reverse_tcpOS X (vfork) Command Shell, Reverse TCP Inline
payload/php/bind_perlPHP Command Shell, Bind TCP (via Perl)
payload/php/bind_perl_ipv6PHP Command Shell, Bind TCP (via perl) IPv6
payload/php/bind_phpPHP Command Shell, Bind TCP (via PHP)
payload/php/bind_php_ipv6PHP Command Shell, Bind TCP (via php) IPv6
payload/php/download_execPHP Executable Download and Execute
payload/php/execPHP Execute Command
payload/php/meterpreter/bind_tcpPHP Meterpreter, Bind TCP Stager
payload/php/meterpreter/bind_tcp_ipv6PHP Meterpreter, Bind TCP Stager IPv6
payload/php/meterpreter/bind_tcp_ipv6_uuidPHP Meterpreter, Bind TCP Stager IPv6 with UUID Support
payload/php/meterpreter/bind_tcp_uuidPHP Meterpreter, Bind TCP Stager with UUID Support
payload/php/meterpreter/reverse_tcpPHP Meterpreter, PHP Reverse TCP Stager
payload/php/meterpreter_reverse_tcpPHP Meterpreter, Reverse TCP Inline
payload/php/meterpreter/reverse_tcp_uuidPHP Meterpreter, PHP Reverse TCP Stager
payload/php/reverse_perlPHP Command, Double Reverse TCP Connection (via Perl)
payload/php/reverse_phpPHP Command Shell, Reverse TCP (via PHP)
payload/php/shell_findsockPHP Command Shell, Find Sock
payload/python/meterpreter/bind_tcpPython Meterpreter, Python Bind TCP Stager
payload/python/meterpreter_bind_tcpPython Meterpreter Shell, Bind TCP Inline
payload/python/meterpreter/bind_tcp_uuidPython Meterpreter, Python Bind TCP Stager with UUID Support
payload/python/meterpreter/reverse_httpPython Meterpreter, Python Reverse HTTP Stager
payload/python/meterpreter_reverse_httpPython Meterpreter Shell, Reverse HTTP Inline
payload/python/meterpreter/reverse_httpsPython Meterpreter, Python Reverse HTTPS Stager
payload/python/meterpreter_reverse_httpsPython Meterpreter Shell, Reverse HTTPS Inline
payload/python/meterpreter/reverse_tcpPython Meterpreter, Python Reverse TCP Stager
payload/python/meterpreter_reverse_tcpPython Meterpreter Shell, Reverse TCP Inline
payload/python/meterpreter/reverse_tcp_sslPython Meterpreter, Python Reverse TCP SSL Stager
payload/python/meterpreter/reverse_tcp_uuidPython Meterpreter, Python Reverse TCP Stager with UUID Support
payload/python/pingback_bind_tcpPython Pingback, Bind TCP (via python)
payload/python/pingback_reverse_tcpPython Pingback, Reverse TCP (via python)
payload/python/shell_bind_tcpCommand Shell, Bind TCP (via python)
payload/python/shell_reverse_tcpCommand Shell, Reverse TCP (via python)
payload/python/shell_reverse_tcp_sslCommand Shell, Reverse TCP SSL (via python)
payload/python/shell_reverse_udpCommand Shell, Reverse UDP (via python)
payload/r/shell_bind_tcpR Command Shell, Bind TCP
payload/r/shell_reverse_tcpR Command Shell, Reverse TCP
payload/ruby/pingback_bind_tcpRuby Pingback, Bind TCP
payload/ruby/pingback_reverse_tcpRuby Pingback, Reverse TCP
payload/ruby/shell_bind_tcpRuby Command Shell, Bind TCP
payload/ruby/shell_bind_tcp_ipv6Ruby Command Shell, Bind TCP IPv6
payload/ruby/shell_reverse_tcpRuby Command Shell, Reverse TCP
payload/ruby/shell_reverse_tcp_sslRuby Command Shell, Reverse TCP SSL
payload/solaris/sparc/shell_bind_tcpSolaris Command Shell, Bind TCP Inline
payload/solaris/sparc/shell_find_portSolaris Command Shell, Find Port Inline
payload/solaris/sparc/shell_reverse_tcpSolaris Command Shell, Reverse TCP Inline
payload/solaris/x86/shell_bind_tcpSolaris Command Shell, Bind TCP Inline
payload/solaris/x86/shell_find_portSolaris Command Shell, Find Port Inline
payload/solaris/x86/shell_reverse_tcpSolaris Command Shell, Reverse TCP Inline
payload/tty/unix/interactUnix TTY, Interact with Established Connection
payload/windows/adduserWindows Execute net user /ADD
payload/windows/custom/bind_hidden_ipknock_tcpWindows shellcode stage, Hidden Bind Ipknock TCP Stager
payload/windows/custom/bind_hidden_tcpWindows shellcode stage, Hidden Bind TCP Stager
payload/windows/custom/bind_ipv6_tcpWindows shellcode stage, Bind IPv6 TCP Stager (Windows x86)
payload/windows/custom/bind_ipv6_tcp_uuidWindows shellcode stage, Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/windows/custom/bind_named_pipeWindows shellcode stage, Windows x86 Bind Named Pipe Stager
payload/windows/custom/bind_nonx_tcpWindows shellcode stage, Bind TCP Stager (No NX or Win7)
payload/windows/custom/bind_tcpWindows shellcode stage, Bind TCP Stager (Windows x86)
payload/windows/custom/bind_tcp_rc4Windows shellcode stage, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/custom/bind_tcp_uuidWindows shellcode stage, Bind TCP Stager with UUID Support (Windows x86)
payload/windows/custom/find_tagWindows shellcode stage, Find Tag Ordinal Stager
payload/windows/custom/reverse_hop_httpWindows shellcode stage, Reverse Hop HTTP/HTTPS Stager
payload/windows/custom/reverse_httpWindows shellcode stage, Windows Reverse HTTP Stager (wininet)
payload/windows/custom/reverse_http_proxy_pstoreWindows shellcode stage, Reverse HTTP Stager Proxy
payload/windows/custom/reverse_httpsWindows shellcode stage, Windows Reverse HTTPS Stager (wininet)
payload/windows/custom/reverse_https_proxyWindows shellcode stage, Reverse HTTPS Stager with Support for Custom Proxy
payload/windows/custom/reverse_ipv6_tcpWindows shellcode stage, Reverse TCP Stager (IPv6)
payload/windows/custom/reverse_named_pipeWindows shellcode stage, Windows x86 Reverse Named Pipe (SMB) Stager
payload/windows/custom/reverse_nonx_tcpWindows shellcode stage, Reverse TCP Stager (No NX or Win7)
payload/windows/custom/reverse_ord_tcpWindows shellcode stage, Reverse Ordinal TCP Stager (No NX or Win7)
payload/windows/custom/reverse_tcp_allportsWindows shellcode stage, Reverse All-Port TCP Stager
payload/windows/custom/reverse_tcp_dnsWindows shellcode stage, Reverse TCP Stager (DNS)
payload/windows/custom/reverse_tcpWindows shellcode stage, Reverse TCP Stager
payload/windows/custom/reverse_tcp_rc4_dnsWindows shellcode stage, Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/windows/custom/reverse_tcp_rc4Windows shellcode stage, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/custom/reverse_tcp_uuidWindows shellcode stage, Reverse TCP Stager with UUID Support
payload/windows/custom/reverse_udpWindows shellcode stage, Reverse UDP Stager with UUID Support
payload/windows/custom/reverse_winhttpWindows shellcode stage, Windows Reverse HTTP Stager (winhttp)
payload/windows/custom/reverse_winhttpsWindows shellcode stage, Windows Reverse HTTPS Stager (winhttp)
payload/windows/dllinject/bind_hidden_ipknock_tcpReflective DLL Injection, Hidden Bind Ipknock TCP Stager
payload/windows/dllinject/bind_hidden_tcpReflective DLL Injection, Hidden Bind TCP Stager
payload/windows/dllinject/bind_ipv6_tcpReflective DLL Injection, Bind IPv6 TCP Stager (Windows x86)
payload/windows/dllinject/bind_ipv6_tcp_uuidReflective DLL Injection, Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/windows/dllinject/bind_named_pipeReflective DLL Injection, Windows x86 Bind Named Pipe Stager
payload/windows/dllinject/bind_nonx_tcpReflective DLL Injection, Bind TCP Stager (No NX or Win7)
payload/windows/dllinject/bind_tcpReflective DLL Injection, Bind TCP Stager (Windows x86)
payload/windows/dllinject/bind_tcp_rc4Reflective DLL Injection, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/dllinject/bind_tcp_uuidReflective DLL Injection, Bind TCP Stager with UUID Support (Windows x86)
payload/windows/dllinject/find_tagReflective DLL Injection, Find Tag Ordinal Stager
payload/windows/dllinject/reverse_hop_httpReflective DLL Injection, Reverse Hop HTTP/HTTPS Stager
payload/windows/dllinject/reverse_httpReflective DLL Injection, Windows Reverse HTTP Stager (wininet)
payload/windows/dllinject/reverse_http_proxy_pstoreReflective DLL Injection, Reverse HTTP Stager Proxy
payload/windows/dllinject/reverse_ipv6_tcpReflective DLL Injection, Reverse TCP Stager (IPv6)
payload/windows/dllinject/reverse_nonx_tcpReflective DLL Injection, Reverse TCP Stager (No NX or Win7)
payload/windows/dllinject/reverse_ord_tcpReflective DLL Injection, Reverse Ordinal TCP Stager (No NX or Win7)
payload/windows/dllinject/reverse_tcp_allportsReflective DLL Injection, Reverse All-Port TCP Stager
payload/windows/dllinject/reverse_tcp_dnsReflective DLL Injection, Reverse TCP Stager (DNS)
payload/windows/dllinject/reverse_tcpReflective DLL Injection, Reverse TCP Stager
payload/windows/dllinject/reverse_tcp_rc4_dnsReflective DLL Injection, Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/windows/dllinject/reverse_tcp_rc4Reflective DLL Injection, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/dllinject/reverse_tcp_uuidReflective DLL Injection, Reverse TCP Stager with UUID Support
payload/windows/dllinject/reverse_winhttpReflective DLL Injection, Windows Reverse HTTP Stager (winhttp)
payload/windows/dns_txt_query_execDNS TXT Record Payload Download and Execution
payload/windows/download_execWindows Executable Download (http,https,ftp) and Execute
payload/windows/execWindows Execute Command
payload/windows/format_all_drivesWindows Drive Formatter
payload/windows/loadlibraryWindows LoadLibrary Path
payload/windows/messageboxWindows MessageBox
payload/windows/meterpreter/bind_hidden_ipknock_tcpWindows Meterpreter (Reflective Injection), Hidden Bind Ipknock TCP Stager
payload/windows/meterpreter/bind_hidden_tcpWindows Meterpreter (Reflective Injection), Hidden Bind TCP Stager
payload/windows/meterpreter/bind_ipv6_tcpWindows Meterpreter (Reflective Injection), Bind IPv6 TCP Stager (Windows x86)
payload/windows/meterpreter/bind_ipv6_tcp_uuidWindows Meterpreter (Reflective Injection), Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/windows/meterpreter/bind_named_pipeWindows Meterpreter (Reflective Injection), Windows x86 Bind Named Pipe Stager
payload/windows/meterpreter_bind_named_pipeWindows Meterpreter Shell, Bind Named Pipe Inline
payload/windows/meterpreter/bind_nonx_tcpWindows Meterpreter (Reflective Injection), Bind TCP Stager (No NX or Win7)
payload/windows/meterpreter/bind_tcpWindows Meterpreter (Reflective Injection), Bind TCP Stager (Windows x86)
payload/windows/meterpreter_bind_tcpWindows Meterpreter Shell, Bind TCP Inline
payload/windows/meterpreter/bind_tcp_rc4Windows Meterpreter (Reflective Injection), Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/meterpreter/bind_tcp_uuidWindows Meterpreter (Reflective Injection), Bind TCP Stager with UUID Support (Windows x86)
payload/windows/meterpreter/find_tagWindows Meterpreter (Reflective Injection), Find Tag Ordinal Stager
payload/windows/meterpreter/reverse_hop_httpWindows Meterpreter (Reflective Injection), Reverse Hop HTTP/HTTPS Stager
payload/windows/meterpreter/reverse_httpWindows Meterpreter (Reflective Injection), Windows Reverse HTTP Stager (wininet)
payload/windows/meterpreter_reverse_httpWindows Meterpreter Shell, Reverse HTTP Inline
payload/windows/meterpreter/reverse_http_proxy_pstoreWindows Meterpreter (Reflective Injection), Reverse HTTP Stager Proxy
payload/windows/meterpreter/reverse_httpsWindows Meterpreter (Reflective Injection), Windows Reverse HTTPS Stager (wininet)
payload/windows/meterpreter_reverse_httpsWindows Meterpreter Shell, Reverse HTTPS Inline
payload/windows/meterpreter/reverse_https_proxyWindows Meterpreter (Reflective Injection), Reverse HTTPS Stager with Support for Custom Proxy
payload/windows/meterpreter/reverse_ipv6_tcpWindows Meterpreter (Reflective Injection), Reverse TCP Stager (IPv6)
payload/windows/meterpreter_reverse_ipv6_tcpWindows Meterpreter Shell, Reverse TCP Inline (IPv6)
payload/windows/meterpreter/reverse_named_pipeWindows Meterpreter (Reflective Injection), Windows x86 Reverse Named Pipe (SMB) Stager
payload/windows/meterpreter/reverse_nonx_tcpWindows Meterpreter (Reflective Injection), Reverse TCP Stager (No NX or Win7)
payload/windows/meterpreter/reverse_ord_tcpWindows Meterpreter (Reflective Injection), Reverse Ordinal TCP Stager (No NX or Win7)
payload/windows/meterpreter/reverse_tcp_allportsWindows Meterpreter (Reflective Injection), Reverse All-Port TCP Stager
payload/windows/meterpreter/reverse_tcp_dnsWindows Meterpreter (Reflective Injection), Reverse TCP Stager (DNS)
payload/windows/meterpreter/reverse_tcpWindows Meterpreter (Reflective Injection), Reverse TCP Stager
payload/windows/meterpreter_reverse_tcpWindows Meterpreter Shell, Reverse TCP Inline
payload/windows/meterpreter/reverse_tcp_rc4_dnsWindows Meterpreter (Reflective Injection), Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/windows/meterpreter/reverse_tcp_rc4Windows Meterpreter (Reflective Injection), Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/meterpreter/reverse_tcp_uuidWindows Meterpreter (Reflective Injection), Reverse TCP Stager with UUID Support
payload/windows/meterpreter/reverse_winhttpWindows Meterpreter (Reflective Injection), Windows Reverse HTTP Stager (winhttp)
payload/windows/meterpreter/reverse_winhttpsWindows Meterpreter (Reflective Injection), Windows Reverse HTTPS Stager (winhttp)
payload/windows/metsvc_bind_tcpWindows Meterpreter Service, Bind TCP
payload/windows/metsvc_reverse_tcpWindows Meterpreter Service, Reverse TCP Inline
payload/windows/patchupdllinject/bind_hidden_ipknock_tcpWindows Inject DLL, Hidden Bind Ipknock TCP Stager
payload/windows/patchupdllinject/bind_hidden_tcpWindows Inject DLL, Hidden Bind TCP Stager
payload/windows/patchupdllinject/bind_ipv6_tcpWindows Inject DLL, Bind IPv6 TCP Stager (Windows x86)
payload/windows/patchupdllinject/bind_ipv6_tcp_uuidWindows Inject DLL, Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/windows/patchupdllinject/bind_named_pipeWindows Inject DLL, Windows x86 Bind Named Pipe Stager
payload/windows/patchupdllinject/bind_nonx_tcpWindows Inject DLL, Bind TCP Stager (No NX or Win7)
payload/windows/patchupdllinject/bind_tcpWindows Inject DLL, Bind TCP Stager (Windows x86)
payload/windows/patchupdllinject/bind_tcp_rc4Windows Inject DLL, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/patchupdllinject/bind_tcp_uuidWindows Inject DLL, Bind TCP Stager with UUID Support (Windows x86)
payload/windows/patchupdllinject/find_tagWindows Inject DLL, Find Tag Ordinal Stager
payload/windows/patchupdllinject/reverse_ipv6_tcpWindows Inject DLL, Reverse TCP Stager (IPv6)
payload/windows/patchupdllinject/reverse_nonx_tcpWindows Inject DLL, Reverse TCP Stager (No NX or Win7)
payload/windows/patchupdllinject/reverse_ord_tcpWindows Inject DLL, Reverse Ordinal TCP Stager (No NX or Win7)
payload/windows/patchupdllinject/reverse_tcp_allportsWindows Inject DLL, Reverse All-Port TCP Stager
payload/windows/patchupdllinject/reverse_tcp_dnsWindows Inject DLL, Reverse TCP Stager (DNS)
payload/windows/patchupdllinject/reverse_tcpWindows Inject DLL, Reverse TCP Stager
payload/windows/patchupdllinject/reverse_tcp_rc4_dnsWindows Inject DLL, Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/windows/patchupdllinject/reverse_tcp_rc4Windows Inject DLL, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/patchupdllinject/reverse_tcp_uuidWindows Inject DLL, Reverse TCP Stager with UUID Support
payload/windows/patchupmeterpreter/bind_hidden_ipknock_tcpWindows Meterpreter (skape/jt Injection), Hidden Bind Ipknock TCP Stager
payload/windows/patchupmeterpreter/bind_hidden_tcpWindows Meterpreter (skape/jt Injection), Hidden Bind TCP Stager
payload/windows/patchupmeterpreter/bind_ipv6_tcpWindows Meterpreter (skape/jt Injection), Bind IPv6 TCP Stager (Windows x86)
payload/windows/patchupmeterpreter/bind_ipv6_tcp_uuidWindows Meterpreter (skape/jt Injection), Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/windows/patchupmeterpreter/bind_named_pipeWindows Meterpreter (skape/jt Injection), Windows x86 Bind Named Pipe Stager
payload/windows/patchupmeterpreter/bind_nonx_tcpWindows Meterpreter (skape/jt Injection), Bind TCP Stager (No NX or Win7)
payload/windows/patchupmeterpreter/bind_tcpWindows Meterpreter (skape/jt Injection), Bind TCP Stager (Windows x86)
payload/windows/patchupmeterpreter/bind_tcp_rc4Windows Meterpreter (skape/jt Injection), Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/patchupmeterpreter/bind_tcp_uuidWindows Meterpreter (skape/jt Injection), Bind TCP Stager with UUID Support (Windows x86)
payload/windows/patchupmeterpreter/find_tagWindows Meterpreter (skape/jt Injection), Find Tag Ordinal Stager
payload/windows/patchupmeterpreter/reverse_ipv6_tcpWindows Meterpreter (skape/jt Injection), Reverse TCP Stager (IPv6)
payload/windows/patchupmeterpreter/reverse_nonx_tcpWindows Meterpreter (skape/jt Injection), Reverse TCP Stager (No NX or Win7)
payload/windows/patchupmeterpreter/reverse_ord_tcpWindows Meterpreter (skape/jt Injection), Reverse Ordinal TCP Stager (No NX or Win7)
payload/windows/patchupmeterpreter/reverse_tcp_allportsWindows Meterpreter (skape/jt Injection), Reverse All-Port TCP Stager
payload/windows/patchupmeterpreter/reverse_tcp_dnsWindows Meterpreter (skape/jt Injection), Reverse TCP Stager (DNS)
payload/windows/patchupmeterpreter/reverse_tcpWindows Meterpreter (skape/jt Injection), Reverse TCP Stager
payload/windows/patchupmeterpreter/reverse_tcp_rc4_dnsWindows Meterpreter (skape/jt Injection), Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/windows/patchupmeterpreter/reverse_tcp_rc4Windows Meterpreter (skape/jt Injection), Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/patchupmeterpreter/reverse_tcp_uuidWindows Meterpreter (skape/jt Injection), Reverse TCP Stager with UUID Support
payload/windows/peinject/bind_hidden_ipknock_tcpWindows Inject PE Files, Hidden Bind Ipknock TCP Stager
payload/windows/peinject/bind_hidden_tcpWindows Inject PE Files, Hidden Bind TCP Stager
payload/windows/peinject/bind_ipv6_tcpWindows Inject PE Files, Bind IPv6 TCP Stager (Windows x86)
payload/windows/peinject/bind_ipv6_tcp_uuidWindows Inject PE Files, Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/windows/peinject/bind_named_pipeWindows Inject PE Files, Windows x86 Bind Named Pipe Stager
payload/windows/peinject/bind_nonx_tcpWindows Inject PE Files, Bind TCP Stager (No NX or Win7)
payload/windows/peinject/bind_tcpWindows Inject PE Files, Bind TCP Stager (Windows x86)
payload/windows/peinject/bind_tcp_rc4Windows Inject PE Files, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/peinject/bind_tcp_uuidWindows Inject PE Files, Bind TCP Stager with UUID Support (Windows x86)
payload/windows/peinject/find_tagWindows Inject PE Files, Find Tag Ordinal Stager
payload/windows/peinject/reverse_ipv6_tcpWindows Inject PE Files, Reverse TCP Stager (IPv6)
payload/windows/peinject/reverse_named_pipeWindows Inject PE Files, Windows x86 Reverse Named Pipe (SMB) Stager
payload/windows/peinject/reverse_nonx_tcpWindows Inject PE Files, Reverse TCP Stager (No NX or Win7)
payload/windows/peinject/reverse_ord_tcpWindows Inject PE Files, Reverse Ordinal TCP Stager (No NX or Win7)
payload/windows/peinject/reverse_tcp_allportsWindows Inject PE Files, Reverse All-Port TCP Stager
payload/windows/peinject/reverse_tcp_dnsWindows Inject PE Files, Reverse TCP Stager (DNS)
payload/windows/peinject/reverse_tcpWindows Inject PE Files, Reverse TCP Stager
payload/windows/peinject/reverse_tcp_rc4_dnsWindows Inject PE Files, Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/windows/peinject/reverse_tcp_rc4Windows Inject PE Files, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/peinject/reverse_tcp_uuidWindows Inject PE Files, Reverse TCP Stager with UUID Support
payload/windows/pingback_bind_tcpWindows x86 Pingback, Bind TCP Inline
payload/windows/pingback_reverse_tcpWindows x86 Pingback, Reverse TCP Inline
payload/windows/powershell_bind_tcpWindows Interactive Powershell Session, Bind TCP
payload/windows/powershell_reverse_tcpWindows Interactive Powershell Session, Reverse TCP
payload/windows/powershell_reverse_tcp_sslWindows Interactive Powershell Session, Reverse TCP SSL
payload/windows/shell/bind_hidden_ipknock_tcpWindows Command Shell, Hidden Bind Ipknock TCP Stager
payload/windows/shell/bind_hidden_tcpWindows Command Shell, Hidden Bind TCP Stager
payload/windows/shell/bind_ipv6_tcpWindows Command Shell, Bind IPv6 TCP Stager (Windows x86)
payload/windows/shell/bind_ipv6_tcp_uuidWindows Command Shell, Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/windows/shell/bind_named_pipeWindows Command Shell, Windows x86 Bind Named Pipe Stager
payload/windows/shell/bind_nonx_tcpWindows Command Shell, Bind TCP Stager (No NX or Win7)
payload/windows/shell/bind_tcpWindows Command Shell, Bind TCP Stager (Windows x86)
payload/windows/shell_bind_tcpWindows Command Shell, Bind TCP Inline
payload/windows/shell/bind_tcp_rc4Windows Command Shell, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/shell/bind_tcp_uuidWindows Command Shell, Bind TCP Stager with UUID Support (Windows x86)
payload/windows/shell_bind_tcp_xpfwWindows Disable Windows ICF, Command Shell, Bind TCP Inline
payload/windows/shell/find_tagWindows Command Shell, Find Tag Ordinal Stager
payload/windows/shell_hidden_bind_tcpWindows Command Shell, Hidden Bind TCP Inline
payload/windows/shell/reverse_ipv6_tcpWindows Command Shell, Reverse TCP Stager (IPv6)
payload/windows/shell/reverse_nonx_tcpWindows Command Shell, Reverse TCP Stager (No NX or Win7)
payload/windows/shell/reverse_ord_tcpWindows Command Shell, Reverse Ordinal TCP Stager (No NX or Win7)
payload/windows/shell/reverse_tcp_allportsWindows Command Shell, Reverse All-Port TCP Stager
payload/windows/shell/reverse_tcp_dnsWindows Command Shell, Reverse TCP Stager (DNS)
payload/windows/shell/reverse_tcpWindows Command Shell, Reverse TCP Stager
payload/windows/shell_reverse_tcpWindows Command Shell, Reverse TCP Inline
payload/windows/shell/reverse_tcp_rc4_dnsWindows Command Shell, Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/windows/shell/reverse_tcp_rc4Windows Command Shell, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/shell/reverse_tcp_uuidWindows Command Shell, Reverse TCP Stager with UUID Support
payload/windows/shell/reverse_udpWindows Command Shell, Reverse UDP Stager with UUID Support
payload/windows/speak_pwnedWindows Speech API - Say "You Got Pwned!"
payload/windows/upexec/bind_hidden_ipknock_tcpWindows Upload/Execute, Hidden Bind Ipknock TCP Stager
payload/windows/upexec/bind_hidden_tcpWindows Upload/Execute, Hidden Bind TCP Stager
payload/windows/upexec/bind_ipv6_tcpWindows Upload/Execute, Bind IPv6 TCP Stager (Windows x86)
payload/windows/upexec/bind_ipv6_tcp_uuidWindows Upload/Execute, Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/windows/upexec/bind_named_pipeWindows Upload/Execute, Windows x86 Bind Named Pipe Stager
payload/windows/upexec/bind_nonx_tcpWindows Upload/Execute, Bind TCP Stager (No NX or Win7)
payload/windows/upexec/bind_tcpWindows Upload/Execute, Bind TCP Stager (Windows x86)
payload/windows/upexec/bind_tcp_rc4Windows Upload/Execute, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/upexec/bind_tcp_uuidWindows Upload/Execute, Bind TCP Stager with UUID Support (Windows x86)
payload/windows/upexec/find_tagWindows Upload/Execute, Find Tag Ordinal Stager
payload/windows/upexec/reverse_ipv6_tcpWindows Upload/Execute, Reverse TCP Stager (IPv6)
payload/windows/upexec/reverse_nonx_tcpWindows Upload/Execute, Reverse TCP Stager (No NX or Win7)
payload/windows/upexec/reverse_ord_tcpWindows Upload/Execute, Reverse Ordinal TCP Stager (No NX or Win7)
payload/windows/upexec/reverse_tcp_allportsWindows Upload/Execute, Reverse All-Port TCP Stager
payload/windows/upexec/reverse_tcp_dnsWindows Upload/Execute, Reverse TCP Stager (DNS)
payload/windows/upexec/reverse_tcpWindows Upload/Execute, Reverse TCP Stager
payload/windows/upexec/reverse_tcp_rc4_dnsWindows Upload/Execute, Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/windows/upexec/reverse_tcp_rc4Windows Upload/Execute, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/upexec/reverse_tcp_uuidWindows Upload/Execute, Reverse TCP Stager with UUID Support
payload/windows/upexec/reverse_udpWindows Upload/Execute, Reverse UDP Stager with UUID Support
payload/windows/vncinject/bind_hidden_ipknock_tcpVNC Server (Reflective Injection), Hidden Bind Ipknock TCP Stager
payload/windows/vncinject/bind_hidden_tcpVNC Server (Reflective Injection), Hidden Bind TCP Stager
payload/windows/vncinject/bind_ipv6_tcpVNC Server (Reflective Injection), Bind IPv6 TCP Stager (Windows x86)
payload/windows/vncinject/bind_ipv6_tcp_uuidVNC Server (Reflective Injection), Bind IPv6 TCP Stager with UUID Support (Windows x86)
payload/windows/vncinject/bind_named_pipeVNC Server (Reflective Injection), Windows x86 Bind Named Pipe Stager
payload/windows/vncinject/bind_nonx_tcpVNC Server (Reflective Injection), Bind TCP Stager (No NX or Win7)
payload/windows/vncinject/bind_tcpVNC Server (Reflective Injection), Bind TCP Stager (Windows x86)
payload/windows/vncinject/bind_tcp_rc4VNC Server (Reflective Injection), Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/vncinject/bind_tcp_uuidVNC Server (Reflective Injection), Bind TCP Stager with UUID Support (Windows x86)
payload/windows/vncinject/find_tagVNC Server (Reflective Injection), Find Tag Ordinal Stager
payload/windows/vncinject/reverse_hop_httpVNC Server (Reflective Injection), Reverse Hop HTTP/HTTPS Stager
payload/windows/vncinject/reverse_httpVNC Server (Reflective Injection), Windows Reverse HTTP Stager (wininet)
payload/windows/vncinject/reverse_http_proxy_pstoreVNC Server (Reflective Injection), Reverse HTTP Stager Proxy
payload/windows/vncinject/reverse_ipv6_tcpVNC Server (Reflective Injection), Reverse TCP Stager (IPv6)
payload/windows/vncinject/reverse_nonx_tcpVNC Server (Reflective Injection), Reverse TCP Stager (No NX or Win7)
payload/windows/vncinject/reverse_ord_tcpVNC Server (Reflective Injection), Reverse Ordinal TCP Stager (No NX or Win7)
payload/windows/vncinject/reverse_tcp_allportsVNC Server (Reflective Injection), Reverse All-Port TCP Stager
payload/windows/vncinject/reverse_tcp_dnsVNC Server (Reflective Injection), Reverse TCP Stager (DNS)
payload/windows/vncinject/reverse_tcpVNC Server (Reflective Injection), Reverse TCP Stager
payload/windows/vncinject/reverse_tcp_rc4_dnsVNC Server (Reflective Injection), Reverse TCP Stager (RC4 Stage Encryption DNS, Metasm)
payload/windows/vncinject/reverse_tcp_rc4VNC Server (Reflective Injection), Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/vncinject/reverse_tcp_uuidVNC Server (Reflective Injection), Reverse TCP Stager with UUID Support
payload/windows/vncinject/reverse_winhttpVNC Server (Reflective Injection), Windows Reverse HTTP Stager (winhttp)
payload/windows/x64/custom/bind_ipv6_tcpWindows shellcode stage, Windows x64 IPv6 Bind TCP Stager
payload/windows/x64/custom/bind_ipv6_tcp_uuidWindows shellcode stage, Windows x64 IPv6 Bind TCP Stager with UUID Support
payload/windows/x64/custom/bind_named_pipeWindows shellcode stage, Windows x64 Bind Named Pipe Stager
payload/windows/x64/custom/bind_tcpWindows shellcode stage, Windows x64 Bind TCP Stager
payload/windows/x64/custom/bind_tcp_rc4Windows shellcode stage, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/x64/custom/bind_tcp_uuidWindows shellcode stage, Bind TCP Stager with UUID Support (Windows x64)
payload/windows/x64/custom/reverse_httpWindows shellcode stage, Windows x64 Reverse HTTP Stager (wininet)
payload/windows/x64/custom/reverse_httpsWindows shellcode stage, Windows x64 Reverse HTTP Stager (wininet)
payload/windows/x64/custom/reverse_named_pipeWindows shellcode stage, Windows x64 Reverse Named Pipe (SMB) Stager
payload/windows/x64/custom/reverse_tcpWindows shellcode stage, Windows x64 Reverse TCP Stager
payload/windows/x64/custom/reverse_tcp_rc4Windows shellcode stage, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/x64/custom/reverse_tcp_uuidWindows shellcode stage, Reverse TCP Stager with UUID Support (Windows x64)
payload/windows/x64/custom/reverse_winhttpWindows shellcode stage, Windows x64 Reverse HTTP Stager (winhttp)
payload/windows/x64/custom/reverse_winhttpsWindows shellcode stage, Windows x64 Reverse HTTPS Stager (winhttp)
payload/windows/x64/execWindows x64 Execute Command
payload/windows/x64/loadlibraryWindows x64 LoadLibrary Path
payload/windows/x64/messageboxWindows MessageBox x64
payload/windows/x64/meterpreter/bind_ipv6_tcpWindows Meterpreter (Reflective Injection x64), Windows x64 IPv6 Bind TCP Stager
payload/windows/x64/meterpreter/bind_ipv6_tcp_uuidWindows Meterpreter (Reflective Injection x64), Windows x64 IPv6 Bind TCP Stager with UUID Support
payload/windows/x64/meterpreter/bind_named_pipeWindows Meterpreter (Reflective Injection x64), Windows x64 Bind Named Pipe Stager
payload/windows/x64/meterpreter_bind_named_pipeWindows Meterpreter Shell, Bind Named Pipe Inline (x64)
payload/windows/x64/meterpreter/bind_tcpWindows Meterpreter (Reflective Injection x64), Windows x64 Bind TCP Stager
payload/windows/x64/meterpreter_bind_tcpWindows Meterpreter Shell, Bind TCP Inline (x64)
payload/windows/x64/meterpreter/bind_tcp_rc4Windows Meterpreter (Reflective Injection x64), Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/x64/meterpreter/bind_tcp_uuidWindows Meterpreter (Reflective Injection x64), Bind TCP Stager with UUID Support (Windows x64)
payload/windows/x64/meterpreter/reverse_httpWindows Meterpreter (Reflective Injection x64), Windows x64 Reverse HTTP Stager (wininet)
payload/windows/x64/meterpreter_reverse_httpWindows Meterpreter Shell, Reverse HTTP Inline (x64)
payload/windows/x64/meterpreter/reverse_httpsWindows Meterpreter (Reflective Injection x64), Windows x64 Reverse HTTP Stager (wininet)
payload/windows/x64/meterpreter_reverse_httpsWindows Meterpreter Shell, Reverse HTTPS Inline (x64)
payload/windows/x64/meterpreter_reverse_ipv6_tcpWindows Meterpreter Shell, Reverse TCP Inline (IPv6) (x64)
payload/windows/x64/meterpreter/reverse_named_pipeWindows Meterpreter (Reflective Injection x64), Windows x64 Reverse Named Pipe (SMB) Stager
payload/windows/x64/meterpreter/reverse_tcpWindows Meterpreter (Reflective Injection x64), Windows x64 Reverse TCP Stager
payload/windows/x64/meterpreter_reverse_tcpWindows Meterpreter Shell, Reverse TCP Inline x64
payload/windows/x64/meterpreter/reverse_tcp_rc4Windows Meterpreter (Reflective Injection x64), Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/x64/meterpreter/reverse_tcp_uuidWindows Meterpreter (Reflective Injection x64), Reverse TCP Stager with UUID Support (Windows x64)
payload/windows/x64/meterpreter/reverse_winhttpWindows Meterpreter (Reflective Injection x64), Windows x64 Reverse HTTP Stager (winhttp)
payload/windows/x64/meterpreter/reverse_winhttpsWindows Meterpreter (Reflective Injection x64), Windows x64 Reverse HTTPS Stager (winhttp)
payload/windows/x64/peinject/bind_ipv6_tcpWindows Inject Reflective PE Files, Windows x64 IPv6 Bind TCP Stager
payload/windows/x64/peinject/bind_ipv6_tcp_uuidWindows Inject Reflective PE Files, Windows x64 IPv6 Bind TCP Stager with UUID Support
payload/windows/x64/peinject/bind_named_pipeWindows Inject Reflective PE Files, Windows x64 Bind Named Pipe Stager
payload/windows/x64/peinject/bind_tcpWindows Inject Reflective PE Files, Windows x64 Bind TCP Stager
payload/windows/x64/peinject/bind_tcp_rc4Windows Inject Reflective PE Files, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/x64/peinject/bind_tcp_uuidWindows Inject Reflective PE Files, Bind TCP Stager with UUID Support (Windows x64)
payload/windows/x64/peinject/reverse_named_pipeWindows Inject Reflective PE Files, Windows x64 Reverse Named Pipe (SMB) Stager
payload/windows/x64/peinject/reverse_tcpWindows Inject Reflective PE Files, Windows x64 Reverse TCP Stager
payload/windows/x64/peinject/reverse_tcp_rc4Windows Inject Reflective PE Files, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/x64/peinject/reverse_tcp_uuidWindows Inject Reflective PE Files, Reverse TCP Stager with UUID Support (Windows x64)
payload/windows/x64/pingback_reverse_tcpWindows x64 Pingback, Reverse TCP Inline
payload/windows/x64/powershell_bind_tcpWindows Interactive Powershell Session, Bind TCP
payload/windows/x64/powershell_reverse_tcpWindows Interactive Powershell Session, Reverse TCP
payload/windows/x64/powershell_reverse_tcp_sslWindows Interactive Powershell Session, Reverse TCP SSL
payload/windows/x64/shell/bind_ipv6_tcpWindows x64 Command Shell, Windows x64 IPv6 Bind TCP Stager
payload/windows/x64/shell/bind_ipv6_tcp_uuidWindows x64 Command Shell, Windows x64 IPv6 Bind TCP Stager with UUID Support
payload/windows/x64/shell/bind_named_pipeWindows x64 Command Shell, Windows x64 Bind Named Pipe Stager
payload/windows/x64/shell/bind_tcpWindows x64 Command Shell, Windows x64 Bind TCP Stager
payload/windows/x64/shell_bind_tcpWindows x64 Command Shell, Bind TCP Inline
payload/windows/x64/shell/bind_tcp_rc4Windows x64 Command Shell, Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/x64/shell/bind_tcp_uuidWindows x64 Command Shell, Bind TCP Stager with UUID Support (Windows x64)
payload/windows/x64/shell/reverse_tcpWindows x64 Command Shell, Windows x64 Reverse TCP Stager
payload/windows/x64/shell_reverse_tcpWindows x64 Command Shell, Reverse TCP Inline
payload/windows/x64/shell/reverse_tcp_rc4Windows x64 Command Shell, Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/x64/shell/reverse_tcp_uuidWindows x64 Command Shell, Reverse TCP Stager with UUID Support (Windows x64)
payload/windows/x64/vncinject/bind_ipv6_tcpWindows x64 VNC Server (Reflective Injection), Windows x64 IPv6 Bind TCP Stager
payload/windows/x64/vncinject/bind_ipv6_tcp_uuidWindows x64 VNC Server (Reflective Injection), Windows x64 IPv6 Bind TCP Stager with UUID Support
payload/windows/x64/vncinject/bind_named_pipeWindows x64 VNC Server (Reflective Injection), Windows x64 Bind Named Pipe Stager
payload/windows/x64/vncinject/bind_tcpWindows x64 VNC Server (Reflective Injection), Windows x64 Bind TCP Stager
payload/windows/x64/vncinject/bind_tcp_rc4Windows x64 VNC Server (Reflective Injection), Bind TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/x64/vncinject/bind_tcp_uuidWindows x64 VNC Server (Reflective Injection), Bind TCP Stager with UUID Support (Windows x64)
payload/windows/x64/vncinject/reverse_httpWindows x64 VNC Server (Reflective Injection), Windows x64 Reverse HTTP Stager (wininet)
payload/windows/x64/vncinject/reverse_httpsWindows x64 VNC Server (Reflective Injection), Windows x64 Reverse HTTP Stager (wininet)
payload/windows/x64/vncinject/reverse_tcpWindows x64 VNC Server (Reflective Injection), Windows x64 Reverse TCP Stager
payload/windows/x64/vncinject/reverse_tcp_rc4Windows x64 VNC Server (Reflective Injection), Reverse TCP Stager (RC4 Stage Encryption, Metasm)
payload/windows/x64/vncinject/reverse_tcp_uuidWindows x64 VNC Server (Reflective Injection), Reverse TCP Stager with UUID Support (Windows x64)
payload/windows/x64/vncinject/reverse_winhttpWindows x64 VNC Server (Reflective Injection), Windows x64 Reverse HTTP Stager (winhttp)
payload/windows/x64/vncinject/reverse_winhttpsWindows x64 VNC Server (Reflective Injection), Windows x64 Reverse HTTPS Stager (winhttp)
post/aix/hashdumpAIX Gather Dump Password Hashes
post/android/capture/screenAndroid Screen Capture
post/android/gather/hashdumpAndroid Gather Dump Password Hashes for Android Systems
post/android/gather/sub_infoextracts subscriber info from target device
post/android/gather/wireless_apDisplays wireless SSIDs and PSKs
post/android/local/koffeeKOFFEE - Kia OFFensivE Exploit
post/android/manage/remove_lockAndroid Settings Remove Device Locks (4.0-4.3)
post/android/manage/remove_lock_rootAndroid Root Remove Device Locks (root)
post/apple_ios/gather/ios_image_gatheriOS Image Gatherer
post/apple_ios/gather/ios_text_gatheriOS Text Gatherer
post/bsd/gather/hashdumpBSD Dump Password Hashes
post/firefox/gather/cookiesFirefox Gather Cookies from Privileged Javascript Shell
post/firefox/gather/historyFirefox Gather History from Privileged Javascript Shell
post/firefox/gather/passwordsFirefox Gather Passwords from Privileged Javascript Shell
post/firefox/gather/xssFirefox XSS
post/firefox/manage/webcam_chatFirefox Webcam Chat on Privileged Javascript Shell
post/hardware/automotive/can_floodCAN Flood
post/hardware/automotive/canprobeModule to Probe Different Data Points in a CAN Packet
post/hardware/automotive/diagnostic_stateDiagnostic State
post/hardware/automotive/ecu_hard_resetECU Hard Reset
post/hardware/automotive/getvinfoGet the Vehicle Information Such as the VIN from the Target Module
post/hardware/automotive/identifymodulesScan CAN Bus for Diagnostic Modules
post/hardware/automotive/malibu_overheatSample Module to Flood Temp Gauge on 2006 Malibu
post/hardware/automotive/mazda_ic_moverMazda 2 Instrument Cluster Accelorometer Mover
post/hardware/automotive/pdtCheck For and Prep the Pyrotechnic Devices (Airbags, Battery Clamps, etc.)
post/hardware/rftransceiver/rfpwnonBrute Force AM/OOK (ie: Garage Doors)
post/hardware/rftransceiver/transmitterRF Transceiver Transmitter
post/hardware/zigbee/zstumblerSends Beacons to Scan for Active ZigBee Networks
post/linux/busybox/enum_connectionsBusyBox Enumerate Connections
post/linux/busybox/enum_hostsBusyBox Enumerate Host Names
post/linux/busybox/jailbreakBusyBox Jailbreak
post/linux/busybox/ping_netBusyBox Ping Network Enumeration
post/linux/busybox/set_dmzBusyBox DMZ Configuration
post/linux/busybox/set_dnsBusyBox DNS Configuration
post/linux/busybox/smb_share_rootBusyBox SMB Sharing
post/linux/busybox/wget_execBusyBox Download and Execute
post/linux/dos/xen_420_dosLinux DoS Xen 4.2.0 2012-5525
post/linux/gather/checkcontainerLinux Gather Container Detection
post/linux/gather/checkvmLinux Gather Virtual Environment Detection
post/linux/gather/ecryptfs_credsGather eCryptfs Metadata
post/linux/gather/enum_commandsTesting commands needed in a function
post/linux/gather/enum_configsLinux Gather Configurations
post/linux/gather/enum_containersLinux Container Enumeration
post/linux/gather/enum_nagios_xiNagios XI Enumeration
post/linux/gather/enum_networkLinux Gather Network Information
post/linux/gather/enum_protectionsLinux Gather Protection Enumeration
post/linux/gather/enum_pskLinux Gather 802-11-Wireless-Security Credentials
post/linux/gather/enum_systemLinux Gather System and User Information
post/linux/gather/enum_users_historyLinux Gather User History
post/linux/gather/gnome_commander_credsLinux Gather Gnome-Commander Creds
post/linux/gather/gnome_keyring_dumpGnome-Keyring Dump
post/linux/gather/haserl_readHaserl Arbitrary File Reader
post/linux/gather/hashdumpLinux Gather Dump Password Hashes for Linux Systems
post/linux/gather/manageengine_password_manager_credsLinux Gather ManageEngine Password Manager Pro Password Extractor
post/linux/gather/mimipenguinMimiPenguin
post/linux/gather/mount_cifs_credsLinux Gather Saved mount.cifs/mount.smbfs Credentials
post/linux/gather/openvpn_credentialsOpenVPN Gather Credentials
post/linux/gather/phpmyadmin_credstealPhpmyadmin credentials stealer
post/linux/gather/pptpd_chap_secretsLinux Gather PPTP VPN chap-secrets Credentials
post/linux/gather/tor_hiddenservicesLinux Gather TOR Hidden Services
post/linux/gather/vcenter_secrets_dumpVMware vCenter Secrets Dump
post/linux/manage/dns_spoofingNative DNS Spoofing module
post/linux/manage/download_execLinux Manage Download and Execute
post/linux/manage/geutebruck_post_expGeutebruck Camera Deface
post/linux/manage/iptables_removalIPTABLES rules removal
post/linux/manage/pseudo_shellPseudo-Shell Post-Exploitation Module
post/linux/manage/sshkey_persistenceSSH Key Persistence
post/multi/escalate/aws_create_iam_userCreate an AWS IAM User
post/multi/escalate/cups_root_file_readCUPS 1.6.1 Root File Read
post/multi/escalate/metasploit_pcaplogMulti Escalate Metasploit pcap_log Local Privilege Escalation
post/multi/gather/apple_ios_backupWindows Gather Apple iOS MobileSync Backup File Collection
post/multi/gather/aws_ec2_instance_metadataGather AWS EC2 Instance Metadata
post/multi/gather/aws_keysUNIX Gather AWS Keys
post/multi/gather/check_malwareMulti Gather Malware Verifier
post/multi/gather/chrome_cookiesChrome Gather Cookies
post/multi/gather/dbvis_enumMulti Gather DbVisualizer Connections Settings
post/multi/gather/dns_bruteforceMulti Gather DNS Forward Lookup Bruteforce
post/multi/gather/dns_reverse_lookupMulti Gather DNS Reverse Lookup Scan
post/multi/gather/dns_srv_lookupMulti Gather DNS Service Record Lookup Scan
post/multi/gather/docker_credsMulti Gather Docker Credentials Collection
post/multi/gather/enum_hexchatLinux Gather HexChat/XChat Enumeration
post/multi/gather/enum_software_versionsMultiplatform Installed Software Version Enumerator
post/multi/gather/enum_vboxMulti Gather VirtualBox VM Enumeration
post/multi/gather/envMulti Gather Generic Operating System Environment Settings
post/multi/gather/fetchmailrc_credsUNIX Gather .fetchmailrc Credentials
post/multi/gather/filezilla_client_credMulti Gather FileZilla FTP Client Credential Collection
post/multi/gather/find_vmxMulti Gather VMWare VM Identification
post/multi/gather/firefox_credsMulti Gather Firefox Signon Credential Collection
post/multi/gather/gpg_credsMulti Gather GnuPG Credentials Collection
post/multi/gather/grub_credsGather GRUB Password
post/multi/gather/irssi_credsMulti Gather IRSSI IRC Password(s)
post/multi/gather/jboss_gatherJboss Credential Collector
post/multi/gather/jenkins_gatherJenkins Credential Collector
post/multi/gather/lastpass_credsLastPass Vault Decryptor
post/multi/gather/maven_credsMulti Gather Maven Credentials Collection
post/multi/gather/multi_commandMulti Gather Run Shell Command Resource File
post/multi/gather/netrc_credsUNIX Gather .netrc Credentials
post/multi/gather/pgpass_credsMulti Gather pgpass Credentials
post/multi/gather/pidgin_credMulti Gather Pidgin Instant Messenger Credential Collection
post/multi/gather/ping_sweepMulti Gather Ping Sweep
post/multi/gather/remmina_credsUNIX Gather Remmina Credentials
post/multi/gather/resolve_hostsMulti Gather Resolve Hosts
post/multi/gather/rsyncd_credsUNIX Gather RSYNC Credentials
post/multi/gather/rubygems_api_keyMulti Gather RubyGems API Key
post/multi/gather/run_console_rc_fileMulti Gather Run Console Resource File
post/multi/gather/saltstack_saltSaltStack Salt Information Gatherer
post/multi/gather/skype_enumMulti Gather Skype User Data Enumeration
post/multi/gather/ssh_credsMulti Gather OpenSSH PKI Credentials Collection
post/multi/gather/thunderbird_credsMulti Gather Mozilla Thunderbird Signon Credential Collection
post/multi/gather/tomcat_gatherGather Tomcat Credentials
post/multi/gather/ubiquiti_unifi_backupMulti Gather Ubiquiti UniFi Controller Backup
post/multi/gather/unix_cached_ad_hashesUNIX Gather Cached AD Hashes
post/multi/gather/unix_kerberos_ticketsUNIX Gather Kerberos Tickets
post/multi/gather/wlan_geolocateMultiplatform WLAN Enumeration and Geolocation
post/multi/general/closeMulti Generic Operating System Session Close
post/multi/general/executeMulti Generic Operating System Session Command Execution
post/multi/general/wallWrite Messages to Users
post/multi/manage/autorouteMulti Manage Network Route via Meterpreter Session
post/multi/manage/dbvis_add_db_adminMulti Manage DbVisualizer Add Db Admin
post/multi/manage/dbvis_queryMulti Manage DbVisualizer Query
post/multi/manage/fileshareBrowse the session filesystem in a Web Browser
post/multi/manage/hsts_eraserWeb browsers HSTS entries eraser
post/multi/manage/multi_postMulti Manage Post Module Macro Execution
post/multi/manage/openOpen a file or URL on the target computer
post/multi/manage/play_youtubeMulti Manage YouTube Broadcast
post/multi/manage/record_micMulti Manage Record Microphone
post/multi/manage/screensaverMulti Manage the screensaver of the target computer
post/multi/manage/screenshareMulti Manage the screen of the target meterpreter session
post/multi/manage/set_wallpaperMulti Manage Set Wallpaper
post/multi/manage/shell_to_meterpreterShell to Meterpreter Upgrade
post/multi/manage/sudoMultiple Linux / Unix Post Sudo Upgrade Shell
post/multi/manage/system_sessionMulti Manage System Remote TCP Shell Session
post/multi/manage/upload_execUpload and Execute
post/multi/manage/zipMulti Manage File Compressor
post/multi/recon/local_exploit_suggesterMulti Recon Local Exploit Suggester
post/multi/recon/multiport_egress_trafficGenerate TCP/UDP Outbound Traffic On Multiple Ports
post/multi/recon/reverse_lookupReverse Lookup IP Addresses
post/multi/recon/sudo_commandsSudo Commands
post/multi/sap/smdagent_get_propertiesDiagnostics Agent in Solution Manager, stores unencrypted credentials for Solution Manager server
post/networking/gather/enum_brocadeBrocade Gather Device General Information
post/networking/gather/enum_ciscoCisco Gather Device General Information
post/networking/gather/enum_f5F5 Gather Device General Information
post/networking/gather/enum_juniperJuniper Gather Device General Information
post/networking/gather/enum_mikrotikMikrotik Gather Device General Information
post/networking/gather/enum_vyosVyOS Gather Device General Information
post/osx/admin/sayOS X Text to Speech Utility
post/osx/capture/keylog_recorderOSX Capture Userspace Keylogger
post/osx/capture/screenOSX Screen Capture
post/osx/escalate/tccbypassBypass the macOS TCC Framework
post/osx/gather/apfs_encrypted_volume_passwdMac OS X APFS Encrypted Volume Password Disclosure
post/osx/gather/autologin_passwordOSX Gather Autologin Password as Root
post/osx/gather/enum_adiumOS X Gather Adium Enumeration
post/osx/gather/enum_airportOS X Gather Airport Wireless Preferences
post/osx/gather/enum_chicken_vnc_profileOS X Gather Chicken of the VNC Profile
post/osx/gather/enum_colloquyOS X Gather Colloquy Enumeration
post/osx/gather/enum_keychainOS X Gather Keychain Enumeration
post/osx/gather/enum_messagesOS X Gather Messages
post/osx/gather/enum_osxOS X Gather Mac OS X System Information Enumeration
post/osx/gather/gitignoreGit Ignore Retriever
post/osx/gather/hashdumpOS X Gather Mac OS X Password Hash Collector
post/osx/gather/password_prompt_spoofOSX Password Prompt Spoof
post/osx/gather/safari_lastsessionOSX Gather Safari LastSession.plist
post/osx/gather/vnc_password_osxOS X Display Apple VNC Password
post/osx/manage/mount_shareOSX Network Share Mounter
post/osx/manage/record_micOSX Manage Record Microphone
post/osx/manage/sonic_piOS X Manage Sonic Pi
post/osx/manage/vpnOSX VPN Manager
post/osx/manage/webcamOSX Manage Webcam
post/solaris/escalate/pfexecSolaris pfexec Upgrade Shell
post/solaris/escalate/srsexec_readlineSolaris srsexec Arbitrary File Reader
post/solaris/gather/checkvmSolaris Gather Virtual Environment Detection
post/solaris/gather/enum_packagesSolaris Gather Installed Packages
post/solaris/gather/enum_servicesSolaris Gather Configured Services
post/solaris/gather/hashdumpSolaris Gather Dump Password Hashes for Solaris Systems
post/windows/capture/keylog_recorderWindows Capture Keystroke Recorder
post/windows/capture/lockout_keyloggerWindows Capture Winlogon Lockout Credential Keylogger
post/windows/escalate/droplnkWindows Escalate SMB Icon LNK Dropper
post/windows/escalate/getsystemWindows Escalate Get System via Administrator
post/windows/escalate/golden_ticketWindows Escalate Golden Ticket
post/windows/escalate/ms10_073_kbdlayoutWindows Escalate NtUserLoadKeyboardLayoutEx Privilege Escalation
post/windows/escalate/screen_unlockWindows Escalate Locked Desktop Unlocker
post/windows/escalate/unmarshal_cmd_execWindows unmarshal post exploitation
post/windows/gather/ad_to_sqliteAD Computer, Group and Recursive User Membership to Local SQLite DB
post/windows/gather/arp_scannerWindows Gather ARP Scanner
post/windows/gather/avast_memory_dumpAvast AV Memory Dumping Utility
post/windows/gather/bitcoin_jackerWindows Gather Bitcoin Wallet
post/windows/gather/bitlocker_fvekBitlocker Master Key (FVEK) Extraction
post/windows/gather/bloodhoundBloodHound Ingestor
post/windows/gather/cachedumpWindows Gather Credential Cache Dump
post/windows/gather/checkvmWindows Gather Virtual Environment Detection
post/windows/gather/credentials/aimAim credential gatherer
post/windows/gather/credentials/avira_passwordWindows Gather Avira Password Extraction
post/windows/gather/credentials/bulletproof_ftpWindows Gather BulletProof FTP Client Saved Password Extraction
post/windows/gather/credentials/chromeChrome credential gatherer
post/windows/gather/credentials/comodoComodo credential gatherer
post/windows/gather/credentials/coolnovoCoolnovo credential gatherer
post/windows/gather/credentials/coreftpWindows Gather CoreFTP Saved Password Extraction
post/windows/gather/credentials/credential_collectorWindows Gather Credential Collector
post/windows/gather/credentials/digsbyDigsby credential gatherer
post/windows/gather/credentials/domain_hashdumpWindows Domain Controller Hashdump
post/windows/gather/credentials/dynazip_logWindows Gather DynaZIP Saved Password Extraction
post/windows/gather/credentials/dyndnsWindows Gather DynDNS Client Password Extractor
post/windows/gather/credentials/enum_cred_storeWindows Gather Credential Store Enumeration and Decryption Module
post/windows/gather/credentials/enum_lapsWindows Gather Credentials Local Administrator Password Solution
post/windows/gather/credentials/enum_picasa_pwdsWindows Gather Google Picasa Password Extractor
post/windows/gather/credentials/epo_sqlWindows Gather McAfee ePO 4.6 Config SQL Credentials
post/windows/gather/credentials/filezilla_serverWindows Gather FileZilla FTP Server Credential Collection
post/windows/gather/credentials/flashfxpWindows Gather FlashFXP Saved Password Extraction
post/windows/gather/credentials/flockFlock credential gatherer
post/windows/gather/credentials/ftpnavigatorWindows Gather FTP Navigator Saved Password Extraction
post/windows/gather/credentials/ftpxWindows Gather FTP Explorer (FTPX) Credential Extraction
post/windows/gather/credentials/gadugaduGadugadu credential gatherer
post/windows/gather/credentials/gppWindows Gather Group Policy Preference Saved Passwords
post/windows/gather/credentials/heidisqlWindows Gather HeidiSQL Saved Password Extraction
post/windows/gather/credentials/icqICQ credential gatherer
post/windows/gather/credentials/idmWindows Gather Internet Download Manager (IDM) Password Extractor
post/windows/gather/credentials/ieIe credential gatherer
post/windows/gather/credentials/imailWindows Gather IPSwitch iMail User Data Enumeration
post/windows/gather/credentials/imvuWindows Gather Credentials IMVU Game Client
post/windows/gather/credentials/incredimailIncredimail credential gatherer
post/windows/gather/credentials/kakaotalkKakaoTalk credential gatherer
post/windows/gather/credentials/kmeleonKmeleon credential gatherer
post/windows/gather/credentials/lineLINE credential gatherer
post/windows/gather/credentials/maxthonMaxthon credential gatherer
post/windows/gather/credentials/mcafee_vse_hashdumpMcAfee Virus Scan Enterprise Password Hashes Dump
post/windows/gather/credentials/mdaemon_cred_collectorWindows Gather MDaemonEmailServer Credential Cracking
post/windows/gather/credentials/meeboWindows Gather Meebo Password Extractor
post/windows/gather/credentials/mirandaMiranda credential gatherer
post/windows/gather/credentials/moba_xtermWindows Gather MobaXterm Passwords
post/windows/gather/credentials/mremoteWindows Gather mRemote Saved Password Extraction
post/windows/gather/credentials/mssql_local_hashdumpWindows Gather Local SQL Server Hash Dump
post/windows/gather/credentials/navicatWindows Gather Navicat Passwords
post/windows/gather/credentials/nimbuzzWindows Gather Nimbuzz Instant Messenger Password Extractor
post/windows/gather/credentials/operaOpera credential gatherer
post/windows/gather/credentials/operamailOperamail credential gatherer
post/windows/gather/credentials/outlookWindows Gather Microsoft Outlook Saved Password Extraction
post/windows/gather/credentials/postboxPostbox credential gatherer
post/windows/gather/credentials/pulse_secureWindows Pulse Secure Connect Client Saved Password Extractor
post/windows/gather/credentials/purevpn_cred_collectorWindows Gather PureVPN Client Credential Collector
post/windows/gather/credentials/qqQQ credential gatherer
post/windows/gather/credentials/razer_synapseWindows Gather Razer Synapse Password Extraction
post/windows/gather/credentials/razorsqlWindows Gather RazorSQL Credentials
post/windows/gather/credentials/rdc_manager_credsWindows Gather Remote Desktop Connection Manager Saved Password Extraction
post/windows/gather/credentials/redis_desktop_managerRedisDesktopManager credential gatherer
post/windows/gather/credentials/safariSafari credential gatherer
post/windows/gather/credentials/seamonkeySeamonkey credential gatherer
post/windows/gather/credentials/securecrtWindows SecureCRT Session Information Enumeration
post/windows/gather/credentials/skypeWindows Gather Skype Saved Password Hash Extraction
post/windows/gather/credentials/smartermailWindows Gather SmarterMail Password Extraction
post/windows/gather/credentials/smartftpWindows Gather SmartFTP Saved Password Extraction
post/windows/gather/credentials/spark_imWindows Gather Spark IM Password Extraction
post/windows/gather/credentials/srwareSrware credential gatherer
post/windows/gather/credentials/ssoWindows Single Sign On Credential Collector (Mimikatz)
post/windows/gather/credentials/steamWindows Gather Steam Client Session Collector.
post/windows/gather/credentials/tangoTango credential gatherer
post/windows/gather/credentials/teamviewer_passwordsWindows Gather TeamViewer Passwords
post/windows/gather/credentials/thunderbirdChrome credential gatherer
post/windows/gather/credentials/thycotic_secretserver_dumpDelinea Thycotic Secret Server Dump
post/windows/gather/credentials/tlenTlen credential gatherer
post/windows/gather/credentials/tortoisesvnWindows Gather TortoiseSVN Saved Password Extraction
post/windows/gather/credentials/total_commanderWindows Gather Total Commander Saved Password Extraction
post/windows/gather/credentials/trillianWindows Gather Trillian Password Extractor
post/windows/gather/credentials/viberViber credential gatherer
post/windows/gather/credentials/vncWindows Gather VNC Password Extraction
post/windows/gather/credentials/windows_autologinWindows Gather AutoLogin User Credential Extractor
post/windows/gather/credentials/windowslivemailWindows Live Mail credential gatherer
post/windows/gather/credentials/windows_sam_hivenightmareWindows SAM secrets leak - HiveNightmare
post/windows/gather/credentials/winscpWindows Gather WinSCP Saved Password Extraction
post/windows/gather/credentials/wsftp_clientWindows Gather WS_FTP Saved Password Extraction
post/windows/gather/credentials/xchatXchat credential gatherer
post/windows/gather/credentials/xshell_xftp_passwordWindows Gather Xshell and Xftp Passwords
post/windows/gather/dnscache_dumpWindows Gather DNS Cache
post/windows/gather/dumplinksWindows Gather Dump Recent Files lnk Info
post/windows/gather/enum_ad_bitlockerWindows Gather Active Directory BitLocker Recovery
post/windows/gather/enum_ad_computersWindows Gather Active Directory Computers
post/windows/gather/enum_ad_groupsWindows Gather Active Directory Groups
post/windows/gather/enum_ad_managedby_groupsWindows Gather Active Directory Managed Groups
post/windows/gather/enum_ad_service_principal_namesWindows Gather Active Directory Service Principal Names
post/windows/gather/enum_ad_to_wordlistWindows Active Directory Wordlist Builder
post/windows/gather/enum_ad_user_commentsWindows Gather Active Directory User Comments
post/windows/gather/enum_ad_usersWindows Gather Active Directory Users
post/windows/gather/enum_applicationsWindows Gather Installed Application Enumeration
post/windows/gather/enum_artifactsWindows Gather File and Registry Artifacts Enumeration
post/windows/gather/enum_av_excludedWindows Antivirus Exclusions Enumeration
post/windows/gather/enum_avWindows Installed AntiVirus Enumeration
post/windows/gather/enum_chocolatey_applicationsWindows Gather Installed Application Within Chocolatey Enumeration
post/windows/gather/enum_chromeWindows Gather Google Chrome User Data Enumeration
post/windows/gather/enum_computersWindows Gather Enumerate Computers
post/windows/gather/enum_dbWindows Gather Database Instance Enumeration
post/windows/gather/enum_devicesWindows Gather Hardware Enumeration
post/windows/gather/enum_dirpermsWindows Gather Directory Permissions Enumeration
post/windows/gather/enum_domain_group_usersWindows Gather Enumerate Domain Group
post/windows/gather/enum_domainWindows Gather Enumerate Domain
post/windows/gather/enum_domainsWindows Gather Domain Enumeration
post/windows/gather/enum_domain_tokensWindows Gather Enumerate Domain Tokens
post/windows/gather/enum_domain_usersWindows Gather Enumerate Active Domain Users
post/windows/gather/enum_emetWindows Gather EMET Protected Paths
post/windows/gather/enum_filesWindows Gather Generic File Collection
post/windows/gather/enum_hostfileWindows Gather Windows Host File Enumeration
post/windows/gather/enum_hyperv_vmsWindows Hyper-V VM Enumeration
post/windows/gather/enum_ieWindows Gather Internet Explorer User Data Enumeration
post/windows/gather/enum_logged_on_usersWindows Gather Logged On User Enumeration (Registry)
post/windows/gather/enum_ms_product_keysWindows Gather Product Key
post/windows/gather/enum_muicacheWindows Gather Enum User MUICache
post/windows/gather/enum_onedriveOneDrive Sync Provider Enumeration Module
post/windows/gather/enum_patchesWindows Gather Applied Patches
post/windows/gather/enum_powershell_envWindows Gather Powershell Environment Setting Enumeration
post/windows/gather/enum_prefetchWindows Gather Prefetch File Information
post/windows/gather/enum_proxyWindows Gather Proxy Setting
post/windows/gather/enum_putty_saved_sessionsPuTTY Saved Sessions Enumeration Module
post/windows/gather/enum_servicesWindows Gather Service Info Enumeration
post/windows/gather/enum_sharesWindows Gather SMB Share Enumeration via Registry
post/windows/gather/enum_snmpWindows Gather SNMP Settings Enumeration (Registry)
post/windows/gather/enum_termservWindows Gather Terminal Server Client Connection Information Dumper
post/windows/gather/enum_tokensWindows Gather Enumerate Domain Admin Tokens (Token Hunter)
post/windows/gather/enum_tomcatWindows Gather Apache Tomcat Enumeration
post/windows/gather/enum_trusted_locationsWindows Gather Microsoft Office Trusted Locations
post/windows/gather/enum_unattendWindows Gather Unattended Answer File Enumeration
post/windows/gather/exchangeWindows Gather Exchange Server Mailboxes
post/windows/gather/file_from_raw_ntfsWindows File Gather File from Raw NTFS
post/windows/gather/forensics/browser_historyWindows Gather Skype, Firefox, and Chrome Artifacts
post/windows/gather/forensics/duqu_checkWindows Gather Forensics Duqu Registry Check
post/windows/gather/forensics/enum_drivesWindows Gather Physical Drives and Logical Volumes
post/windows/gather/forensics/fanny_bmp_checkFannyBMP or DementiaWheel Detection Registry Check
post/windows/gather/forensics/imagerWindows Gather Forensic Imaging
post/windows/gather/forensics/nbd_serverWindows Gather Local NBD Server
post/windows/gather/forensics/recovery_filesWindows Gather Deleted Files Enumeration and Recovering
post/windows/gather/get_bookmarksBookmarked Sites Retriever
post/windows/gather/hashdumpWindows Gather Local User Account Password Hashes (Registry)
post/windows/gather/local_admin_search_enumWindows Gather Local Admin Search
post/windows/gather/lsa_secretsWindows Enumerate LSA Secrets
post/windows/gather/make_csv_orgchartGenerate CSV Organizational Chart Data Using Manager Information
post/windows/gather/memory_dumpWindows Process Memory Dump
post/windows/gather/memory_grepWindows Gather Process Memory Grep
post/windows/gather/netlm_downgradeWindows NetLM Downgrade Attack
post/windows/gather/ntds_grabberNTDS Grabber
post/windows/gather/ntds_locationPost Windows Gather NTDS.DIT Location
post/windows/gather/outlookWindows Gather Outlook Email Messages
post/windows/gather/phish_windows_credentialsWindows Gather User Credentials (phishing)
post/windows/gather/psreadline_historyWindows Gather PSReadline History
post/windows/gather/resolve_sidWindows Gather Local User Account SID Lookup
post/windows/gather/reverse_lookupWindows Gather IP Range Reverse Lookup
post/windows/gather/screen_spyWindows Gather Screen Spy
post/windows/gather/smart_hashdumpWindows Gather Local and Domain Controller Account Password Hashes
post/windows/gather/tcpnetstatWindows Gather TCP Netstat
post/windows/gather/usb_historyWindows Gather USB Drive History
post/windows/gather/win_privsWindows Gather Privileges Enumeration
post/windows/gather/wmic_commandWindows Gather Run Specified WMIC Command
post/windows/gather/word_unc_injectorWindows Gather Microsoft Office Word UNC Path Injector
post/windows/manage/add_userWindows Manage Add User to the Domain and/or to a Domain Group
post/windows/manage/archmigrateArchitecture Migrate
post/windows/manage/change_passwordWindows Manage Change Password
post/windows/manage/clone_proxy_settingsWindows Manage Proxy Setting Cloner
post/windows/manage/delete_userWindows Manage Local User Account Deletion
post/windows/manage/dell_memory_protectDell DBUtilDrv2.sys Memory Protection Modifier
post/windows/manage/download_execWindows Manage Download and/or Execute
post/windows/manage/driver_loaderWindows Manage Driver Loader
post/windows/manage/enable_rdpWindows Manage Enable Remote Desktop
post/windows/manage/enable_support_accountWindows Manage Trojanize Support Account
post/windows/manage/exec_powershellWindows Powershell Execution Post Module
post/windows/manage/execute_dotnet_assemblyExecute .net Assembly (x64 only)
post/windows/manage/forward_pageantForward SSH Agent Requests To Remote Pageant
post/windows/manage/hashcarveWindows Local User Account Hash Carver
post/windows/manage/ie_proxypacWindows Manage Proxy PAC File
post/windows/manage/inject_caWindows Manage Certificate Authority Injection
post/windows/manage/inject_hostWindows Manage Hosts File Injection
post/windows/manage/install_pythonInstall Python for Windows
post/windows/manage/install_sshInstall OpenSSH for Windows
post/windows/manage/killavWindows Post Kill Antivirus and Hips
post/windows/manage/migrateWindows Manage Process Migration
post/windows/manage/mssql_local_auth_bypassWindows Manage Local Microsoft SQL Server Authorization Bypass
post/windows/manage/multi_meterpreter_injectWindows Manage Inject in Memory Multiple Payloads
post/windows/manage/nbd_serverWindows Manage Local NBD Server for Remote Disks
post/windows/manage/peinjectorPeinjector
post/windows/manage/persistence_exeWindows Manage Persistent EXE Payload Installer
post/windows/manage/portproxyWindows Manage Set Port Forwarding With PortProxy
post/windows/manage/powershell/build_net_codePowershell .NET Compiler
post/windows/manage/powershell/exec_powershellWindows Manage PowerShell Download and/or Execute
post/windows/manage/powershell/load_scriptLoad Scripts Into PowerShell Session
post/windows/manage/pptp_tunnelWindows Manage Remote Point-to-Point Tunneling Protocol
post/windows/manage/priv_migrateWindows Manage Privilege Based Process Migration
post/windows/manage/pxeexploitWindows Manage PXE Exploit Server
post/windows/manage/reflective_dll_injectWindows Manage Reflective DLL Injection Module
post/windows/manage/remove_caWindows Manage Certificate Authority Removal
post/windows/manage/remove_hostWindows Manage Host File Entry Removal
post/windows/manage/rid_hijackWindows Manage RID Hijacking
post/windows/manage/rollback_defender_signaturesDisable Windows Defender Signatures
post/windows/manage/rpcapd_startWindows Manage Remote Packet Capture Service Starter
post/windows/manage/run_asWindows Manage Run Command As User
post/windows/manage/run_as_pshWindows 'Run As' Using Powershell
post/windows/manage/sdelWindows Manage Safe Delete
post/windows/manage/shellcode_injectWindows Manage Memory Shellcode Injection Module
post/windows/manage/sshkey_persistenceSSH Key Persistence
post/windows/manage/sticky_keysSticky Keys Persistance Module
post/windows/manage/vmdk_mountWindows Manage VMDK Mount Drive
post/windows/manage/vss_createWindows Manage Create Shadow Copy
post/windows/manage/vssWindows Manage Volume Shadow Copies
post/windows/manage/vss_listWindows Manage List Shadow Copies
post/windows/manage/vss_mountWindows Manage Mount Shadow Copy
post/windows/manage/vss_set_storageWindows Manage Set Shadow Copy Storage Space
post/windows/manage/vss_storageWindows Manage Get Shadow Copy Storage Info
post/windows/manage/wdigest_cachingWindows Post Manage WDigest Credential Caching
post/windows/manage/webcamWindows Manage Webcam
post/windows/recon/computer_browser_discoveryWindows Recon Computer Browser Discovery
post/windows/recon/outbound_portsWindows Outbound-Filtering Rules
post/windows/recon/resolve_ipWindows Recon Resolve IP
post/windows/wlan/wlan_bss_listWindows Gather Wireless BSS Info
post/windows/wlan/wlan_current_connectionWindows Gather Wireless Current Connection Info
post/windows/wlan/wlan_disconnectWindows Disconnect Wireless Connection
post/windows/wlan/wlan_probe_requestWindows Send Probe Request Packets
post/windows/wlan/wlan_profileWindows Gather Wireless Profile