Automatically attack all file shares within AD network environment. Exploiting weak permissions.
☆17Aug 2, 2019Updated 6 years ago
Alternatives and similar repositories for shareAttack
Users that are interested in shareAttack are comparing it to the libraries listed below
Sorting:
- RACF and z/OS tools and info☆35Aug 5, 2025Updated 7 months ago
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- It checks how secure the program you made is and shows how vulnerable your program is.☆20Apr 20, 2017Updated 8 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Mar 2, 2017Updated 9 years ago
- Exercise files for Python Essential Training☆13Dec 20, 2020Updated 5 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- I worked through 100 Pandas Puzzles (actually only 45) and did some data visualizations with the 2010 Denver Census data.☆12Dec 15, 2020Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Sep 20, 2015Updated 10 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- Read-only release history for ttylog☆16Oct 22, 2014Updated 11 years ago
- A mail reflector written in Python with modules for SPF, DKIM and DMARC authentication, used as a test system for testing correspondent's…☆13Sep 15, 2016Updated 9 years ago
- Start or attach to a process and monitor a customizable set of metrics (CPU, I/O, etc.)☆34Apr 15, 2017Updated 8 years ago
- An implementation of jpnevulator in Python☆21Jan 30, 2018Updated 8 years ago
- Internet Radio based on the Beaglebone Black platform☆15Mar 4, 2016Updated 10 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- Documentation for IPinfo official client libraries and integrations☆16Jul 23, 2025Updated 7 months ago
- Generate Sequelize model definitions from a Swagger 2.0 schema☆11Nov 13, 2020Updated 5 years ago
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago
- A go implementation of metrics reporting for Circonus☆12Sep 23, 2025Updated 5 months ago
- OG Atomic Red Team☆30Jun 12, 2018Updated 7 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- A basic cli tool for downloading all the enrolled courses from udemy account☆12Dec 14, 2019Updated 6 years ago
- Citrix Apps and Desktop - Session Module☆10May 13, 2022Updated 3 years ago
- My config files☆41Nov 18, 2025Updated 4 months ago
- Healthcheck script for use with ExaBGP☆11Jan 30, 2024Updated 2 years ago
- An Out-of-Band XXE server for retrieving file contents over FTP.☆185May 27, 2020Updated 5 years ago
- POLAR☆74Feb 13, 2019Updated 7 years ago