Tool to enumerate shares from Windows hosts.
☆69Apr 20, 2022Updated 3 years ago
Alternatives and similar repositories for shareenum
Users that are interested in shareenum are comparing it to the libraries listed below
Sorting:
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆261Aug 6, 2016Updated 9 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Aug 9, 2013Updated 12 years ago
- IPV6 MITM attack tool☆92Aug 7, 2013Updated 12 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Oct 1, 2021Updated 4 years ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Aug 6, 2014Updated 11 years ago
- Resident (inotify) Anti-Malware Scanner using rules from Linux Malware Detect project☆11Jul 5, 2014Updated 11 years ago
- A collection of captured SSH login credentials☆17Mar 28, 2021Updated 4 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- ☆38Jan 7, 2025Updated last year
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- dev backup for main site☆40Jan 3, 2018Updated 8 years ago
- An LDAP based Active Directory user and group enumeration tool☆306Feb 11, 2026Updated 2 weeks ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- crack login and pass☆13Oct 15, 2018Updated 7 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 10 years ago
- Useful scripts for pen testing. Require modification to run☆13Oct 17, 2020Updated 5 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Jul 10, 2018Updated 7 years ago
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆15Jul 30, 2020Updated 5 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- Weekly industry summary☆17Apr 27, 2018Updated 7 years ago
- ☆21Apr 16, 2023Updated 2 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆207Sep 25, 2018Updated 7 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37May 20, 2013Updated 12 years ago
- SQLC2 is a PowerShell script for deploying and managing a command and control system that uses SQL Server as both the control server and …☆77Nov 5, 2022Updated 3 years ago
- Research into COM☆19Jan 25, 2020Updated 6 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago