DanMcInerney / smb-autopwnView external linksLinks
Discovers and exploits hosts vulnerable to MS08-067/MS17-010
☆43Mar 2, 2018Updated 7 years ago
Alternatives and similar repositories for smb-autopwn
Users that are interested in smb-autopwn are comparing it to the libraries listed below
Sorting:
- Obfuscated Invoke-Mimikatz☆52Oct 23, 2018Updated 7 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14May 29, 2018Updated 7 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Simple, hand-picked list of fuzz strings☆34Nov 5, 2016Updated 9 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆238Dec 8, 2022Updated 3 years ago
- Generate a ms batch file and inject a files inside of it. When the batch is executed, the files are extracted and executed.☆21Oct 19, 2019Updated 6 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- dDumper is a Drupal Vulnerability Scanner & an Auto Exploiter.☆20Mar 11, 2024Updated last year
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.☆46Jan 26, 2019Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Mar 10, 2023Updated 2 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- The Windows 10 LPE exploit written by SandboxEscaper☆110Oct 2, 2018Updated 7 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- A Linux rootkit☆10Nov 1, 2018Updated 7 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆10Dec 4, 2018Updated 7 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 6 months ago
- Metasploit Framework☆11Apr 18, 2019Updated 6 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Exploit the vulnerability to execute the calculator☆68Jan 11, 2018Updated 8 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Aug 9, 2019Updated 6 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆46Mar 1, 2021Updated 4 years ago
- Aggressor script to integrate Phant0m with Cobalt Strike☆27Jun 8, 2017Updated 8 years ago
- Collection of IronPython scripts and executables for penetration testing☆57Feb 26, 2019Updated 6 years ago
- Script to enabled DNS Debug Logging across Domain Controllers in a Forest and then retrieve for analysis☆14May 27, 2016Updated 9 years ago
- awesome、python、C++、linux、database、php、sql、penetration、security、infosec、javascript、tips...☆13Jul 6, 2018Updated 7 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 5 years ago