3ndG4me / CVE-2020-3452-ExploitLinks
Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.
☆24Updated 5 years ago
Alternatives and similar repositories for CVE-2020-3452-Exploit
Users that are interested in CVE-2020-3452-Exploit are comparing it to the libraries listed below
Sorting:
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- ☆73Updated 7 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Creates and sends fake meeting invite☆74Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- ☆54Updated 4 years ago
- Google Meet Phishing Template For Gophish☆47Updated 3 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆57Updated 5 years ago
- Super organized and flexible script for sending phishing campaigns☆56Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- REST API backend for Reconmap☆46Updated last week
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- ☆37Updated 2 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 11 months ago
- Fast website scraper and wordlist generator☆82Updated 8 months ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆51Updated 3 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆64Updated 3 years ago
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- ☆47Updated 3 years ago
- Notification webhook for GoPhish☆57Updated last year
- Fly into Gophish with One Click (Infra Automation)☆52Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆40Updated 2 years ago
- ☆30Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago