0x68302A / merOS-virt
Build and Interact with a Set of Virtual Machines
☆15Updated 2 years ago
Alternatives and similar repositories for merOS-virt:
Users that are interested in merOS-virt are comparing it to the libraries listed below
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Updated 3 months ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- Capturing audio (.wav) from target using a link☆12Updated 5 years ago
- ☆9Updated 3 years ago
- Companion Worm research☆15Updated 3 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆11Updated 7 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- ☆16Updated 6 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 4 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Tool useful to discover services behind unknown ports☆13Updated 3 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- Skeleton project for your own GRUB-based bootkit☆15Updated 5 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 8 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆13Updated 9 years ago
- Toolkit to detected abnormal activities on a Windows machine.☆11Updated 9 years ago