SherlockSec / CVE-2019-0708Links
A Win7 RDP exploit
☆13Updated 6 years ago
Alternatives and similar repositories for CVE-2019-0708
Users that are interested in CVE-2019-0708 are comparing it to the libraries listed below
Sorting:
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- This extension provide a Python panel for writing custom proxy script.☆15Updated 5 years ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- ☆50Updated 4 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- Projects and POCs☆60Updated 10 years ago
- For educational purposes only, use at your own responsibility. metasploit_rc_scripts - contains either sample rc files for explatation o…☆20Updated 7 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Setup Kali XFCE version with some hi-dpi friendly style☆32Updated 5 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 7 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- Offline Security Focus Database☆31Updated 12 years ago
- ☆11Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 6 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- ☆17Updated 5 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆36Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 4 years ago