Cisco CallManager User Enumeration
☆15Aug 16, 2022Updated 3 years ago
Alternatives and similar repositories for vnum
Users that are interested in vnum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Feb 19, 2026Updated last month
- ☆60Aug 11, 2023Updated 2 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Easily reproduce Go binaries☆34Mar 9, 2026Updated 2 weeks ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆74Aug 5, 2023Updated 2 years ago
- pypykatz plugin for volatility3 framework☆46May 30, 2025Updated 9 months ago
- ☆16May 20, 2022Updated 3 years ago
- ☆50May 12, 2021Updated 4 years ago
- ☆20Jul 19, 2021Updated 4 years ago
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated last year
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- A guide to silicon reverse engineering by optical microscophy☆14Dec 27, 2024Updated last year
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆103May 4, 2019Updated 6 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- ☆199Feb 27, 2026Updated 3 weeks ago
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆16Jan 21, 2023Updated 3 years ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Jul 14, 2023Updated 2 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Jan 28, 2025Updated last year
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 9 months ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- A subdomain reconnaissance scanner☆36Dec 8, 2022Updated 3 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- Windows APT Warfare, published by Packt☆75Mar 11, 2023Updated 3 years ago
- ☆52Dec 11, 2019Updated 6 years ago
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- Binaries, drivers, PoCs and other stuff on Hydroph0bia vulnerability (CVE-2025-4275)☆41Jun 20, 2025Updated 9 months ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16May 26, 2017Updated 8 years ago
- A technique for Active Directory domain persistence☆39May 31, 2023Updated 2 years ago
- ☆27Apr 22, 2025Updated 11 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Aug 5, 2022Updated 3 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆33Nov 12, 2022Updated 3 years ago