Verification tools for CVE-2016-1287
☆33Mar 15, 2017Updated 8 years ago
Alternatives and similar repositories for asa_tools
Users that are interested in asa_tools are comparing it to the libraries listed below
Sorting:
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- ☆13Apr 29, 2016Updated 9 years ago
- lair-docker-compose repo☆17Mar 11, 2021Updated 4 years ago
- CVE-2016-1287 vulnerability test☆16Feb 15, 2016Updated 10 years ago
- ☆252Sep 18, 2019Updated 6 years ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆211Apr 12, 2017Updated 8 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Feb 21, 2017Updated 9 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- Main repository to pull all NCC Group Cisco ASA-related tool projects.☆233Aug 24, 2018Updated 7 years ago
- A remote administration tool that uses Twitch Chat as a Command and Control server.☆12Sep 20, 2019Updated 6 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- A variation of the IKE-SCAN user guide's transforms discovery script, adding a few features. Handshakes can be done in Main or Aggressive…☆13Jul 4, 2024Updated last year
- Go client for Elasticsearch OSINT platform☆15Nov 4, 2023Updated 2 years ago
- few months old but better than nothing☆58Feb 11, 2022Updated 4 years ago
- Collection of my Python Scripts☆41Aug 14, 2020Updated 5 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- A simple keylogger application for XSS attack.☆16Aug 13, 2017Updated 8 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- Yet Another LinkedIn Scraper☆33Mar 9, 2023Updated 2 years ago
- Make Windows LNK file with python (pylnk)☆64Jun 4, 2016Updated 9 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆252Sep 27, 2023Updated 2 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Dec 23, 2017Updated 8 years ago
- An OSINT employee/username enumeration tool☆68Dec 15, 2025Updated 2 months ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- IPSec testing tool☆19Oct 19, 2024Updated last year
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- An example pattern in C# for watching security events (logon/logoff/privilege)☆17Aug 13, 2018Updated 7 years ago
- Issues to consider when planning a red team exercise.☆15Aug 22, 2017Updated 8 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- ☆20Jan 18, 2024Updated 2 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- Minimalistic IKEv2 (RFC 5996) implementation in Python.☆22Mar 16, 2018Updated 7 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- Caeser Cipher your shellcode!☆21Mar 11, 2022Updated 3 years ago