Onapsis / CVE-2020-6287_RECON-scannerLinks
☆28Updated 3 years ago
Alternatives and similar repositories for CVE-2020-6287_RECON-scanner
Users that are interested in CVE-2020-6287_RECON-scanner are comparing it to the libraries listed below
Sorting:
- ☆67Updated 6 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Noob Penetration tester☆11Updated last year
- ☆26Updated 3 years ago
- Python Script for SAML2 Authentication Passwordspray☆39Updated last year
- Python script for SAP secure storage decrypton☆13Updated 7 years ago
- Cobalt Strike/C2 Servers☆13Updated 4 years ago
- Tool to automate corporate network segmentation test☆20Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- A tool to password spray Jenkins instances☆57Updated 6 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆85Updated 2 years ago
- SAP Message Server research presented at OPCDE 2019☆35Updated 4 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- An Ansible role for installing Cobalt Strike.☆78Updated 3 weeks ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- You can check below blog post on attacks related to azure storage.☆13Updated 4 years ago
- ☆45Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- ☆54Updated 4 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 3 years ago
- A basic proxylogon scanner☆27Updated 3 years ago