TH3xACE / OFFPORT_KILLER
This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan or services running locally. The tool is useful when nmap or any scanning tool is not available and in the situation during which you did a manual port scanning and then want to identify the services running be…
☆50Updated 4 years ago
Alternatives and similar repositories for OFFPORT_KILLER:
Users that are interested in OFFPORT_KILLER are comparing it to the libraries listed below
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- ☆34Updated last month
- Sp00fer blog post -☆26Updated 2 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- ☆22Updated 4 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆28Updated 8 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆32Updated 5 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year
- An email client in CLI, designed specifically for spearphishing.☆13Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago