3ndG4me / CVE-2020-3452-ExploitLinks
Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.
☆24Updated 5 years ago
Alternatives and similar repositories for CVE-2020-3452-Exploit
Users that are interested in CVE-2020-3452-Exploit are comparing it to the libraries listed below
Sorting:
- User enumeration and password spraying tool for testing Azure AD☆71Updated 3 years ago
- ☆73Updated 7 years ago
- ☆54Updated 4 years ago
- Most common AWS S3 bucket names.☆28Updated 5 years ago
- ☆37Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- Notification webhook for GoPhish☆57Updated last year
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆58Updated 5 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆45Updated 5 years ago
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- Super organized and flexible script for sending phishing campaigns☆56Updated 4 years ago
- MITMsmtp is an Evil SMTP Server for pentesting SMTP clients to catch login credentials and mails sent over plain or SSL encrypted connect…☆42Updated 2 years ago
- Creates and sends fake meeting invite☆75Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated 2 years ago
- Anonymize your hashcat formatted files for online cracking☆31Updated last year
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated last year
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 4 years ago
- Google Meet Phishing Template For Gophish☆48Updated 3 years ago
- ☆27Updated 2 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated last year
- autocrack adds queue support for hashcat cracking.☆40Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- ☆30Updated 2 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago