Andromeda1957 / LinPwn
Interactive Post Exploitation Tool
☆36Updated 5 years ago
Alternatives and similar repositories for LinPwn:
Users that are interested in LinPwn are comparing it to the libraries listed below
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- CVE-2020-12828 PoC and Analysis.☆29Updated 4 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 6 years ago
- Self defense post module for metasploit☆17Updated 5 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Updated 5 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Updated 8 years ago
- All the information provided on this site is for educational purposes only.☆17Updated last year
- Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning (Under Development)☆17Updated 6 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated 11 months ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated last year
- ☆20Updated 5 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆45Updated 4 years ago
- Essential tool for finding blind injection attacks.☆50Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- PDF report generator for basic recon☆9Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago