Verification tools for CVE-2016-1287
☆33Mar 15, 2017Updated 9 years ago
Alternatives and similar repositories for asa_tools
Users that are interested in asa_tools are comparing it to the libraries listed below
Sorting:
- lair-docker-compose repo☆17Mar 11, 2021Updated 5 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- ☆13Apr 29, 2016Updated 9 years ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- ☆252Sep 18, 2019Updated 6 years ago
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- Go client for Elasticsearch OSINT platform☆15Nov 4, 2023Updated 2 years ago
- Main repository to pull all NCC Group Cisco ASA-related tool projects.☆233Aug 24, 2018Updated 7 years ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆211Apr 12, 2017Updated 8 years ago
- Issues to consider when planning a red team exercise.☆15Aug 22, 2017Updated 8 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Feb 21, 2017Updated 9 years ago
- CVE-2016-1287 vulnerability test☆16Feb 15, 2016Updated 10 years ago
- few months old but better than nothing☆58Feb 11, 2022Updated 4 years ago
- Collection of my Python Scripts☆41Aug 14, 2020Updated 5 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆27Nov 11, 2020Updated 5 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆252Sep 27, 2023Updated 2 years ago
- Yet Another LinkedIn Scraper☆33Mar 9, 2023Updated 3 years ago
- A simple keylogger application for XSS attack.☆16Aug 13, 2017Updated 8 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- ☆18May 3, 2016Updated 9 years ago
- Make Windows LNK file with python (pylnk)☆64Jun 4, 2016Updated 9 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- An OSINT employee/username enumeration tool☆68Dec 15, 2025Updated 3 months ago
- Bash script that tests if a system is Winshock (MS14-066) vulnerable☆101Nov 15, 2014Updated 11 years ago
- Golng version of SharpDump that can be used to extract LSASS or any other proces. Provides token elevation prior to creating dump of high…☆21Oct 6, 2020Updated 5 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- A BurpSuite extension for lair☆28Oct 18, 2017Updated 8 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Aug 29, 2022Updated 3 years ago
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- A remote administration tool that uses Twitch Chat as a Command and Control server.☆12Sep 20, 2019Updated 6 years ago
- A variation of the IKE-SCAN user guide's transforms discovery script, adding a few features. Handshakes can be done in Main or Aggressive…☆13Jul 4, 2024Updated last year