0v3rride / Enum4LinuxPyLinks
Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.
☆85Updated 3 years ago
Alternatives and similar repositories for Enum4LinuxPy
Users that are interested in Enum4LinuxPy are comparing it to the libraries listed below
Sorting:
- Simple script to generate commands to achieve reverse shells.☆118Updated 4 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- Changes for Visual Studio 2013☆118Updated 10 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆143Updated 3 years ago
- ☆150Updated last year
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago
- Some of the best web shells that you might need☆45Updated 6 years ago
- Windows Kernel Exploits☆66Updated 7 years ago
- Microsoft External Attack Tool☆179Updated 2 years ago
- WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift☆33Updated 3 years ago
- ☆9Updated 3 years ago
- Script for Local Windows Enumeration☆32Updated 7 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆168Updated 3 years ago
- Enyx SNMP IPv6 Enumeration Tool☆102Updated 2 years ago
- Juicy Potato for x86 Windows☆122Updated 5 years ago
- A Linux enumeration script for Hack The Box☆189Updated 5 years ago
- Tool that automates Active Directory enumeration☆88Updated 4 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆203Updated 2 years ago
- A list of "secrets" from JWT sample code and readme files.☆55Updated 4 years ago
- 👹☆56Updated 3 years ago
- BloodHound Docker Ready to Use☆90Updated 2 years ago
- Scripts created to help with post exploitation of a Windows host☆97Updated 4 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆233Updated 3 years ago
- ☆27Updated 5 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆40Updated 3 months ago
- ☆53Updated 6 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆189Updated 5 years ago
- Ultimate File Transfer List☆62Updated 2 years ago
- A HTA shell to assist with breakout assessments.☆113Updated 3 years ago