3mrgnc3 / pentest_oldLinks
pentest tools
☆41Updated 8 years ago
Alternatives and similar repositories for pentest_old
Users that are interested in pentest_old are comparing it to the libraries listed below
Sorting:
- Enyx SNMP IPv6 Enumeration Tool☆106Updated 2 years ago
- Just some exploits :P☆46Updated 4 years ago
- Changes for Visual Studio 2013☆119Updated 10 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆47Updated 10 years ago
- Handbook and survival guide for hacking over the wire, OSCP-style☆43Updated 4 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆114Updated 4 years ago
- Linux Local Enumeration Script☆80Updated 5 years ago
- Updating MS08-067 Python exploit script☆104Updated 7 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆266Updated 7 years ago
- An SNMPv3 User Enumerator and Attack tool☆254Updated 5 years ago
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Updated 10 years ago
- davtest (improved)- Exploits WebDAV folders☆116Updated 2 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- …(⊙_⊙;)…☆56Updated 4 years ago
- Custom tools and projects about security☆110Updated 2 months ago
- A Linux enumeration script for Hack The Box☆190Updated 5 years ago
- ☆37Updated 6 years ago
- Domain user enumeration tool☆214Updated last year
- SNMP data gather scripts☆84Updated last year
- Simple script to generate commands to achieve reverse shells.☆120Updated 4 years ago
- 👹☆56Updated 4 years ago
- The Hacker Playbook 3 - Web Commands☆85Updated 7 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- ☆155Updated 8 years ago
- ☆137Updated 8 years ago
- Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)☆29Updated 7 years ago
- Simple forward and reverse shells that can be compiled and used on pen tests to avoid AV and used to get better access.☆29Updated 12 years ago
- Collection of different exploits☆180Updated 4 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Updated 4 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 5 years ago