KraudSecurity / IPMI_Exploits
☆14Updated 3 years ago
Alternatives and similar repositories for IPMI_Exploits:
Users that are interested in IPMI_Exploits are comparing it to the libraries listed below
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Certificate Export Utility☆26Updated 4 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Updated 6 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Updated 6 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Updated 5 years ago
- ☆16Updated 9 years ago
- ☆21Updated 5 years ago
- ☆13Updated 3 years ago
- ADD/SUB encoder for alphanumeric shellcode☆9Updated 5 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Updated 5 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated 11 months ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- Security Advisories☆11Updated 5 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- ☆11Updated 7 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Windows 10 Exploit☆30Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 7 years ago
- ☆30Updated 6 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Updated 5 years ago
- ☆16Updated 4 years ago