3ndG4me / CVE-2020-3452-Exploit
Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.
☆24Updated 4 years ago
Alternatives and similar repositories for CVE-2020-3452-Exploit:
Users that are interested in CVE-2020-3452-Exploit are comparing it to the libraries listed below
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆35Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆54Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Convert ldapdomaindump to Bloodhound☆79Updated last year
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- A simple program to query nmap xml files in the terminal.☆28Updated 4 years ago
- ☆26Updated 2 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆85Updated 2 years ago
- Notification webhook for GoPhish☆54Updated 10 months ago
- Open-Source Phishing Toolkit☆18Updated 3 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆11Updated 4 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- ☆16Updated 3 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Creates and sends fake meeting invite☆59Updated 4 years ago
- Username lists that I created.☆17Updated 3 years ago
- ☆29Updated 2 years ago
- Discord C2 Profile for Mythic☆28Updated 2 months ago
- Check robustness of your (their) Active Directory accounts passwords☆34Updated last month
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago