TH3xACE / OFFPORT_KILLER
This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan or services running locally. The tool is useful when nmap or any scanning tool is not available and in the situation during which you did a manual port scanning and then want to identify the services running be…
☆50Updated 3 years ago
Related projects: ⓘ
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated last year
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- ☆23Updated this week
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆35Updated 6 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 5 months ago
- Interactive Post Exploitation Tool☆36Updated 4 years ago
- ☆33Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆35Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆71Updated 4 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆45Updated 6 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆22Updated 10 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 2 years ago
- ☆24Updated this week
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- A rogue DNS detector☆23Updated 11 months ago
- Hunt and Analyze Tor Onion Sites☆23Updated last year
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆35Updated 5 years ago
- A defense tool - detect web shells in local directories via md5sum☆31Updated 5 years ago
- A collection of curated Java Deserialization Exploits☆9Updated 6 years ago
- ☆23Updated this week
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated last year