BishopFox / pwn-pulse
Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
☆137Updated 5 years ago
Alternatives and similar repositories for pwn-pulse:
Users that are interested in pwn-pulse are comparing it to the libraries listed below
- Domain user enumeration tool☆215Updated last year
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆202Updated last year
- A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.☆98Updated 6 years ago
- A HTA shell to assist with breakout assessments.☆113Updated 3 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆174Updated 4 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆156Updated 4 years ago
- Samba, NFS shares spider and grepper☆71Updated 6 years ago
- Parse NTLM challenge messages over HTTP and SMB☆146Updated 2 years ago
- An Insider Threat Toolkit☆151Updated 6 years ago
- Custom tools and projects about security☆110Updated 4 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- A tool to create obfuscated HTA script.☆177Updated 3 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆80Updated 3 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆204Updated 4 years ago
- CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13☆63Updated 5 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Simple python script to extract unsafe functions from php projects☆199Updated 7 years ago
- ☆121Updated 8 years ago
- Ultimate File Transfer List☆62Updated 2 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆93Updated 4 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Updated 5 years ago
- Web-based check for Windows privesc vulnerabilities☆139Updated last year
- GodOfWar - Malicious Java WAR builder with built-in payloads☆122Updated 6 years ago
- Repo with various Red Team scripts☆145Updated 4 years ago
- ☆129Updated 7 years ago
- Proof of concept for CVE-2020-5902☆72Updated 4 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- ☆128Updated last year
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago