NullArray / PyParser-CVE
Multi source CVE/exploit parser.
☆27Updated 7 years ago
Alternatives and similar repositories for PyParser-CVE:
Users that are interested in PyParser-CVE are comparing it to the libraries listed below
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Converts a command to a base64 powershell compatible string☆25Updated 10 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 7 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 12 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆15Updated 8 years ago
- Specify targets and run sets of tools against them☆11Updated 9 years ago
- ☆47Updated 9 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆53Updated 7 years ago
- Gmail Knocker☆21Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆55Updated 4 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆39Updated 6 years ago
- Random stuff☆16Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- python code to connect to mail servers and pillage the data contained within☆9Updated 8 years ago
- AV Bypass☆29Updated 7 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- SQL Injection without the pain of syringes.☆25Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago