nmap detection scripts for CVE-2022-45477, CVE-2022-45479, CVE-2022-45482, CVE-2022-45481
☆16Apr 19, 2024Updated last year
Alternatives and similar repositories for nmap-vulnerability-scan-scripts
Users that are interested in nmap-vulnerability-scan-scripts are comparing it to the libraries listed below
Sorting:
- Quick and dirty reconnaissance hacks for BB and pentesting☆11Feb 20, 2023Updated 3 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago
- A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it☆16Jun 13, 2025Updated 8 months ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- Advanced use of WPScan (WordPress Security Scanner) with other tools like nmap, nikto, owasp-zap, ids for ethnical Hackers☆22Aug 13, 2025Updated 6 months ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23May 15, 2024Updated last year
- ☆35Feb 1, 2026Updated last month
- A light C# implant that bypasses Windows Firewall and Defender☆27Oct 2, 2021Updated 4 years ago
- A lightweight ducky script generator written in python.☆36Feb 6, 2021Updated 5 years ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆77May 16, 2024Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆41Dec 12, 2025Updated 2 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Oct 30, 2024Updated last year
- AUTOMATIC111/stable-difusion-webui的Golang API服务端☆13Jul 10, 2023Updated 2 years ago
- CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information☆34Jul 19, 2024Updated last year
- Automate the build of a vulnerable AD environment.☆40Aug 19, 2022Updated 3 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Feb 6, 2026Updated 3 weeks ago
- Streamlit MongoDB Connector: An efficient connector for interfacing MongoDB with Streamlit apps, developed for the Streamlit Connections …☆11Dec 19, 2023Updated 2 years ago
- ☆12Jul 4, 2024Updated last year
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Pentesting Suite☆65Jul 1, 2025Updated 7 months ago
- ☆13Jun 29, 2023Updated 2 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- My Nmap without root privileges! For hackers.☆43Jul 30, 2023Updated 2 years ago
- reverse shell, Bypass windows defender firewall☆45Nov 13, 2024Updated last year
- Havoc python api☆45May 23, 2023Updated 2 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago
- An exploit for CVE-2018-5955 GitStack 2.3.10 Unauthenticated RCE☆10Nov 15, 2024Updated last year
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。☆11Nov 28, 2022Updated 3 years ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Apr 29, 2025Updated 10 months ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Aug 30, 2021Updated 4 years ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Jul 31, 2023Updated 2 years ago