Rainor23 / SMB_Inspector
β16Updated 2 months ago
Alternatives and similar repositories for SMB_Inspector:
Users that are interested in SMB_Inspector are comparing it to the libraries listed below
- A script to automate keystrokes through a graphical desktop program.β34Updated 2 months ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! π΄ββ οΈβ36Updated last week
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishingβ40Updated 3 weeks ago
- SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configurationβ38Updated 2 years ago
- SprayShark is a modular G-Suite password sprayer with threading!β36Updated last month
- β58Updated 5 months ago
- β51Updated 2 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.β44Updated last year
- Enumeration & fingerprint toolβ24Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β61Updated 7 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.β64Updated last year
- Tools used for Pentestingβ22Updated last year
- Fast Path Traversal exploitation toolβ21Updated 11 months ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticalβ¦β26Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whiβ¦β39Updated 7 months ago
- quick and dirty proof-of-concept to hide shells in imagesβ49Updated 9 months ago
- β51Updated last month
- Repo for all my exploits/PoCsβ50Updated last month
- Tactics, Techniques, and Proceduresβ25Updated 2 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy serviceβ74Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.β63Updated 6 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privilegesβ22Updated 4 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.β38Updated last year
- Custom mini tools during Red Teaming engagementsβ12Updated 3 weeks ago
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs stepβ¦β20Updated last week
- β27Updated 2 years ago
- Azure Service Subdomain Enumerationβ57Updated 7 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.β41Updated last year
- Burp Suite Extension for inserting a magic byte into responder's requestβ24Updated last year
- β34Updated last year