Pwnistry / Windows-Exploit-Suggester-python3Links
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
☆47Updated 2 years ago
Alternatives and similar repositories for Windows-Exploit-Suggester-python3
Users that are interested in Windows-Exploit-Suggester-python3 are comparing it to the libraries listed below
Sorting:
- OSCP Cheatsheets☆99Updated 6 years ago
- ☆85Updated 5 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆78Updated 4 years ago
- ☆33Updated 4 years ago
- Windows Kernel Exploits☆69Updated 8 years ago
- A little utility to convert nmap xml results to markdown tables☆71Updated 3 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆124Updated 4 years ago
- Password spraying tool and Bloodhound integration☆248Updated 11 months ago
- handy powershell scripts☆65Updated last year
- ☆67Updated 3 years ago
- Powershell script to extract information from boot PXE☆153Updated 6 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Lookup for interesting stuff in SMB shares☆151Updated 2 years ago
- ☆158Updated 3 months ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆143Updated 3 weeks ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Updated 7 years ago
- ☆104Updated 6 years ago
- Password list generator for password spraying - prebaked with goodies☆108Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated last year
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
- OSCP notes☆56Updated 4 years ago
- Collection of username lists for enumerating kerberos domain users☆104Updated 8 years ago
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆180Updated last month
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆217Updated 2 months ago
- Reverse Shell-able Windows exploits short POCs.☆33Updated 5 years ago
- ☆92Updated 5 years ago
- ☆38Updated 4 years ago
- Dumping LAPS from Python☆284Updated 3 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆80Updated 6 years ago
- BloodHound Docker Ready to Use☆91Updated 2 years ago