LuemmelSec / Moodle-ScannerLinks
A Moodle Scanner
☆42Updated 6 months ago
Alternatives and similar repositories for Moodle-Scanner
Users that are interested in Moodle-Scanner are comparing it to the libraries listed below
Sorting:
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆29Updated last month
- Scripts that automate portions of pentests.☆50Updated last month
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆30Updated 2 months ago
- A small red team course☆39Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆23Updated 6 months ago
- ☆35Updated 6 months ago
- ☆70Updated last month
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- ☆56Updated 6 months ago
- Phishing Framework for OTP codes☆31Updated 2 weeks ago
- Azure Service Subdomain Enumeration☆60Updated 9 months ago
- Simple netexec wraper with html repport☆19Updated last year
- Exploits Unauth Docker API☆41Updated last month
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆57Updated this week
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆36Updated 4 months ago
- ☆59Updated 7 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 6 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 9 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 6 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- ☆90Updated this week
- ☆55Updated 3 months ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆30Updated last week
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Repo for all my exploits/PoCs☆50Updated 3 weeks ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated 2 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆44Updated last year