Scan for and exploit Consul agents
☆39Jun 11, 2019Updated 6 years ago
Alternatives and similar repositories for Constole
Users that are interested in Constole are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- BlueKeep scanner supporting NLA☆167Jul 18, 2019Updated 6 years ago
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆17Oct 26, 2018Updated 7 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆103Dec 8, 2022Updated 3 years ago
- CCDC Red Team PWNboard☆77Mar 29, 2018Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Some scripts and exploits☆149Jul 9, 2018Updated 7 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 12 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- ☆11Feb 20, 2015Updated 11 years ago
- Store 802.11 frames in Elasticsearch. Visualize with Kibana☆59Apr 14, 2024Updated 2 years ago
- Scripts to execute enumeration via LFI☆92Apr 8, 2019Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Jul 29, 2016Updated 9 years ago
- ☆26Dec 8, 2025Updated 4 months ago
- ☆29Mar 15, 2017Updated 9 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 7 years ago
- ☆22Oct 22, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆22Nov 9, 2023Updated 2 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- public bugs/proof of concepts☆48Mar 10, 2021Updated 5 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 9 years ago
- ☆81Nov 2, 2019Updated 6 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Encode powershell payload into bat files☆155Feb 1, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- python tools to assist in penetration testing☆14Jan 19, 2026Updated 3 months ago
- Github for the scripts utilised during Penetration test☆237Jun 12, 2017Updated 8 years ago
- Dockerfiles for security tools☆52Nov 7, 2024Updated last year
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Standalone tool to explore the security model of Windows and its NT kernel. Use it to introspect privilege assignments and access right a…☆33May 21, 2019Updated 6 years ago
- ☆41May 16, 2018Updated 7 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆246Oct 22, 2021Updated 4 years ago