Diefunction / Pureftpd-FXPAbuse
abuse Pureftpd FXP to obtain the ipv6 of the target server
☆11Updated 3 years ago
Alternatives and similar repositories for Pureftpd-FXPAbuse:
Users that are interested in Pureftpd-FXPAbuse are comparing it to the libraries listed below
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 5 years ago
- ☆21Updated 5 years ago
- ☆36Updated 6 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated 2 years ago
- A simple remote scanner for Liferay Portal☆18Updated 2 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- A mirror of several precompiled standalone red-teaming tools.☆18Updated 2 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- ☆23Updated 4 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 2 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆20Updated 3 months ago
- ☆17Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- My python3 implementation of a Forward Shell☆35Updated 6 years ago
- Advisories and Proofs of Concept by BlackArrow☆17Updated 3 months ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆53Updated 5 years ago
- Principles and commands for penetration testing and OSCP☆9Updated 5 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆34Updated 3 years ago
- ☆24Updated last year
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 5 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆45Updated 5 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 8 years ago