TH3xACE / OFFPORT_KILLER
This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan or services running locally. The tool is useful when nmap or any scanning tool is not available and in the situation during which you did a manual port scanning and then want to identify the services running be…
☆50Updated 4 years ago
Alternatives and similar repositories for OFFPORT_KILLER:
Users that are interested in OFFPORT_KILLER are comparing it to the libraries listed below
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- another nmap summarising script☆25Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆28Updated 8 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated 2 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- Automatically spin up infra for phishing☆63Updated 5 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- ☆18Updated last year
- Miscellaneous exploit scripts☆17Updated 2 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- ☆33Updated 2 months ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago