TH3xACE / OFFPORT_KILLER
This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan or services running locally. The tool is useful when nmap or any scanning tool is not available and in the situation during which you did a manual port scanning and then want to identify the services running be…
☆50Updated 4 years ago
Alternatives and similar repositories for OFFPORT_KILLER:
Users that are interested in OFFPORT_KILLER are comparing it to the libraries listed below
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 8 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆29Updated 8 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Random code snippets☆10Updated last year
- Automatically spin up infra for phishing☆64Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Updated 5 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- ☆20Updated 5 years ago