3ndG4me / CVE-2020-3452-Exploit
Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.
☆24Updated 4 years ago
Alternatives and similar repositories for CVE-2020-3452-Exploit
Users that are interested in CVE-2020-3452-Exploit are comparing it to the libraries listed below
Sorting:
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆28Updated 5 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- ☆26Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆35Updated last year
- Noob Penetration tester☆11Updated 11 months ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 3 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 3 months ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Updated 4 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- Stuff for OSWP Exam - Try harder ^^☆9Updated 7 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 4 years ago
- Notification webhook for GoPhish☆54Updated 11 months ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- webshells written with malice☆22Updated 7 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆39Updated 3 years ago