FXWarChest / McAfeeSiteListView external linksLinks
This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.
☆26Dec 8, 2017Updated 8 years ago
Alternatives and similar repositories for McAfeeSiteList
Users that are interested in McAfeeSiteList are comparing it to the libraries listed below
Sorting:
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- ☆75Aug 29, 2014Updated 11 years ago
- Information Gathering Tool☆24Aug 16, 2013Updated 12 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- A web interface for Hashcat/oclHashcat☆30Nov 15, 2016Updated 9 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Exploits for Dell EMC RecoverPoint enterprise data protection platform☆13Jun 22, 2018Updated 7 years ago
- ☆18Feb 2, 2026Updated last week
- ☆16Apr 4, 2015Updated 10 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago
- ☆15Aug 28, 2014Updated 11 years ago
- A simple python library to interact with Microsoft Graph and Office 365 API☆18Dec 13, 2018Updated 7 years ago
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆171Jan 27, 2019Updated 7 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆112Jun 27, 2017Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- Executes lateral movement through PowerPoint DCOM objects☆20Feb 3, 2018Updated 8 years ago
- [Firefox] SOP bypass PoC for CVE-2015-7214 (MFSA 2015-149)☆14Apr 28, 2016Updated 9 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Feb 17, 2016Updated 9 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Imports an LDAP file from Active Directory for SQL based offline reconnisance☆55Jun 1, 2016Updated 9 years ago
- python client/server keystroke logger☆23Oct 7, 2012Updated 13 years ago
- ☆27Jan 27, 2017Updated 9 years ago
- Db Database Assessment Tool☆212Jun 26, 2018Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- #INFILTRATE19 raptor's party pack.☆33Nov 10, 2025Updated 3 months ago
- A small utility to connect a TCP socket to a Windows named pipe. It can be used, for exemple, to capture network data with tcpdump on Lin…☆42May 2, 2012Updated 13 years ago
- Execute a shell command within Cloud Run☆31Jul 7, 2022Updated 3 years ago
- Metasploit AV Evasion Tool☆256Dec 22, 2015Updated 10 years ago
- Malamute is a fuzzing toolkit initially developed to aid with regression-test based fuzzing of language interpreters☆29Jan 4, 2016Updated 10 years ago
- Win32k LPE vulnerability used in APT attack☆291Dec 18, 2017Updated 8 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆71Oct 19, 2017Updated 8 years ago