Pwnistry / Windows-Exploit-Suggester-python3
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
☆39Updated last year
Alternatives and similar repositories for Windows-Exploit-Suggester-python3:
Users that are interested in Windows-Exploit-Suggester-python3 are comparing it to the libraries listed below
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆42Updated 7 months ago
- User enumeration and password spraying tool for testing Azure AD☆68Updated 2 years ago
- ☆41Updated 4 years ago
- Password list generator for password spraying - prebaked with goodies☆100Updated last year
- OSWE Preparation☆37Updated 5 years ago
- Windows Kernel Exploits☆65Updated 7 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 3 years ago
- OSCP Cheatsheets☆94Updated 5 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- Fly into Gophish with One Click (Infra Automation)☆46Updated last year
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆28Updated 6 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆92Updated 3 years ago
- A list of "secrets" from JWT sample code and readme files.☆53Updated 4 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆83Updated 3 years ago
- This repo will contain some basic pentest/RT commands.☆37Updated 2 years ago
- ☆65Updated 2 years ago
- ☆66Updated 4 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆27Updated 3 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 4 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆59Updated 2 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- ☆103Updated 5 years ago
- A shot code to Bypass UAC in Windows.☆26Updated 2 years ago
- Merge multiple nMap xml files into one☆50Updated 5 years ago
- C2 Automation using Linode☆78Updated 2 years ago
- Find the remote website version based on a git repository☆125Updated 3 years ago
- https://alvinsmith.gitbook.io/progressive-oscp/☆39Updated this week
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆39Updated 2 years ago
- ☆26Updated 3 years ago