High Performance, lightweight, portable Open Source tool for mass SMBGhost Scan
☆153Jun 25, 2020Updated 5 years ago
Alternatives and similar repositories for GoGhost
Users that are interested in GoGhost are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- Enumerate a target Based off of Nmap Results☆76Oct 25, 2023Updated 2 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- Red Team PowerShell Script☆338Jul 31, 2023Updated 2 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆110Oct 10, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Interactive CLI Web Crawler☆179Oct 15, 2021Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆111Apr 24, 2020Updated 5 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆21Aug 29, 2022Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- A polyglot payload generator☆244Aug 15, 2022Updated 3 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- client-side prototype pullution vulnerability scanner☆46Aug 23, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tangalanga: the Zoom conference scanner hacking tool☆288Oct 20, 2020Updated 5 years ago
- ☆100Feb 16, 2021Updated 5 years ago
- A collection of C# tools for various purposes (kerberoasting, tickets, mimikatz, privesc, domain enumeration and more)☆80Aug 12, 2019Updated 6 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- ThinkPHP vulnerability scan for BurpSuite☆15Nov 18, 2019Updated 6 years ago
- Web-based check for Windows privesc vulnerabilities☆139May 14, 2023Updated 2 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆555Jul 3, 2020Updated 5 years ago
- Tool to brute website sub-domains and dirs.☆49May 13, 2020Updated 5 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Fast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.☆40May 1, 2020Updated 5 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 4 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆224Dec 5, 2020Updated 5 years ago
- Gmail shell, for hackers execute commands via gmail☆19Feb 3, 2021Updated 5 years ago
- A python script file to forensically examine remote computer networks - It can analyse smb and ldap active directory systems, start phis…☆16Jan 18, 2026Updated 2 months ago
- ☆159Aug 4, 2020Updated 5 years ago
- One way to continuously monitor sensitive information that could be exposed on Github☆172Jun 16, 2020Updated 5 years ago
- A fast http and https prober, to check which URLs are alive☆68Aug 5, 2019Updated 6 years ago
- Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security prof…☆417Nov 24, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 7 years ago
- Linux post exploitation privilege escalation enumeration☆257Aug 20, 2020Updated 5 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆92May 10, 2020Updated 5 years ago
- A python script which allows you to parse GeoLocation data from your Image files stored in a dataset.It also produces output in CSV file …☆42Dec 20, 2020Updated 5 years ago
- Pipe different tools with google dork Scanner☆56Jun 25, 2020Updated 5 years ago
- Nuubi Tools (Information-ghatering|Scanner|Recon.)☆87Jun 27, 2020Updated 5 years ago