0x68302A / merOS-virt
Build and Interact with a Set of Virtual Machines
☆15Updated 2 years ago
Alternatives and similar repositories for merOS-virt:
Users that are interested in merOS-virt are comparing it to the libraries listed below
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- ☆9Updated 3 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆11Updated 8 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- module for certexfil☆15Updated 2 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- ☆16Updated 6 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 3 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- Automated Payload Test Controller☆9Updated 7 years ago
- Capturing audio (.wav) from target using a link☆12Updated 5 years ago
- Collection Of Scripts And Utilities For Windows Event Hunting☆18Updated 5 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Updated 3 years ago
- Layer 2 VPN using a tap device on one end and pcap on the other☆10Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- SecrutiyTube Linux Assembly Exam☆10Updated 5 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago