Userspace NFS client shell
☆133Jun 13, 2025Updated 8 months ago
Alternatives and similar repositories for nfsshell
Users that are interested in nfsshell are comparing it to the libraries listed below
Sorting:
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- A PowerShell script for performing a build review of a Windows host☆23Mar 11, 2019Updated 6 years ago
- ☆1,488Dec 31, 2022Updated 3 years ago
- netshell features all in version 2 powershell☆2,349Mar 5, 2024Updated 2 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- Tool to audit and attack LAPS environments☆928Jan 31, 2018Updated 8 years ago
- Webmin Remote Code Execution (authenticated)☆33Sep 1, 2019Updated 6 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script.☆333Sep 13, 2021Updated 4 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Aug 30, 2016Updated 9 years ago
- goverview - Get an overview of the list of URLs☆142Dec 5, 2025Updated 3 months ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,621Jan 23, 2024Updated 2 years ago
- Tool to enumerate shares from Windows hosts.☆69Apr 20, 2022Updated 3 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,992Oct 10, 2018Updated 7 years ago
- ODAT: Oracle Database Attacking Tool☆1,742Jul 27, 2024Updated last year
- Java RMI Vulnerability Scanner☆915Jul 3, 2024Updated last year
- ☆19Oct 5, 2020Updated 5 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Feb 8, 2017Updated 9 years ago
- Active Directory information dumper via LDAP☆1,385Apr 6, 2025Updated 11 months ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆87Feb 2, 2022Updated 4 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- ActiveMQ Deserialization RCE☆15Aug 30, 2019Updated 6 years ago
- woodpecker框架专用bcel库☆12Apr 30, 2021Updated 4 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Browser-based packet viewer powered by Wireshark☆20Jul 28, 2025Updated 7 months ago
- A simple Go script to brute force or parse a password-protected PKCS#12 (PFX/P12) file.☆44Dec 31, 2020Updated 5 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,916Apr 13, 2022Updated 3 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆608Feb 6, 2015Updated 11 years ago
- https://stackoverflow.com/questions/33052406/invalid-compressed-data-format-violated☆26Sep 13, 2020Updated 5 years ago
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- Supporting material for the frida scripting guide☆22Jul 2, 2022Updated 3 years ago
- Quick scan to find live hosts on the network/across networks☆48Jul 4, 2014Updated 11 years ago
- Infect Shared Files In Memory for Lateral Movement☆193Dec 14, 2022Updated 3 years ago
- Active Directory ACL exploitation with BloodHound☆755Nov 18, 2021Updated 4 years ago