Scan for and exploit Consul agents
☆39Jun 11, 2019Updated 6 years ago
Alternatives and similar repositories for Constole
Users that are interested in Constole are comparing it to the libraries listed below
Sorting:
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- BlueKeep scanner supporting NLA☆167Jul 18, 2019Updated 6 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Dec 8, 2022Updated 3 years ago
- CCDC Red Team PWNboard☆77Mar 29, 2018Updated 7 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Some scripts and exploits☆148Jul 9, 2018Updated 7 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 12 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- ☆11Feb 20, 2015Updated 11 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Jul 29, 2016Updated 9 years ago
- Scripts to execute enumeration via LFI☆92Apr 8, 2019Updated 6 years ago
- ☆26Dec 8, 2025Updated 3 months ago
- ☆29Mar 15, 2017Updated 9 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 6 years ago
- Burp Suite extension to discover assets from HTTP response.☆232Jan 22, 2025Updated last year
- ☆21Oct 22, 2019Updated 6 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- public bugs/proof of concepts☆48Mar 10, 2021Updated 5 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- ☆81Nov 2, 2019Updated 6 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Encode powershell payload into bat files☆155Feb 1, 2018Updated 8 years ago
- python tools to assist in penetration testing☆14Jan 19, 2026Updated 2 months ago
- Github for the scripts utilised during Penetration test☆237Jun 12, 2017Updated 8 years ago
- Dockerfiles for security tools☆52Nov 7, 2024Updated last year
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Standalone tool to explore the security model of Windows and its NT kernel. Use it to introspect privilege assignments and access right a…☆33May 21, 2019Updated 6 years ago
- ☆41May 16, 2018Updated 7 years ago