3ndG4me / CVE-2020-3452-ExploitLinks
Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.
☆24Updated 4 years ago
Alternatives and similar repositories for CVE-2020-3452-Exploit
Users that are interested in CVE-2020-3452-Exploit are comparing it to the libraries listed below
Sorting:
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- ☆26Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆54Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆28Updated 5 years ago
- Noob Penetration tester☆11Updated last year
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- ☆54Updated 4 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- Anonymize your hashcat formatted files for online cracking☆30Updated 7 months ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12Updated 2 years ago
- Stealthy Stand Alone PHP Web Shell☆33Updated 5 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 3 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 5 months ago
- Username lists that I created.☆17Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago