Automatically attack all file shares within AD network environment. Exploiting weak permissions.
☆17Aug 2, 2019Updated 6 years ago
Alternatives and similar repositories for shareAttack
Users that are interested in shareAttack are comparing it to the libraries listed below
Sorting:
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- It checks how secure the program you made is and shows how vulnerable your program is.☆20Apr 20, 2017Updated 8 years ago
- Internet Radio based on the Beaglebone Black platform☆15Mar 4, 2016Updated 9 years ago
- RACF and z/OS tools and info☆35Aug 5, 2025Updated 6 months ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- A cookbook for managing the local security policy on a Windows system☆13Apr 13, 2021Updated 4 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago
- An implementation of jpnevulator in Python☆21Jan 30, 2018Updated 8 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- REST API test utility☆22Oct 31, 2019Updated 6 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- ☆22May 20, 2016Updated 9 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Nov 12, 2014Updated 11 years ago
- Start or attach to a process and monitor a customizable set of metrics (CPU, I/O, etc.)☆34Apr 15, 2017Updated 8 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- Automatic attack detector and botnet classifier☆28Jan 10, 2017Updated 9 years ago
- OG Atomic Red Team☆29Jun 12, 2018Updated 7 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Sep 20, 2015Updated 10 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Exercise files for Python Essential Training☆13Dec 20, 2020Updated 5 years ago
- Clone of hidden tear written in C++☆70Oct 18, 2020Updated 5 years ago
- An Out-of-Band XXE server for retrieving file contents over FTP.☆185May 27, 2020Updated 5 years ago
- Script for doing evil stuff to Redis servers (for educational purposes only).☆71Aug 12, 2016Updated 9 years ago