Scan for and exploit Consul agents
☆39Jun 11, 2019Updated 6 years ago
Alternatives and similar repositories for Constole
Users that are interested in Constole are comparing it to the libraries listed below
Sorting:
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- BlueKeep scanner supporting NLA☆167Jul 18, 2019Updated 6 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- CCDC Red Team PWNboard☆77Mar 29, 2018Updated 7 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Dec 8, 2022Updated 3 years ago
- Python tool which scours popular CI tools build logs☆16Dec 8, 2022Updated 3 years ago
- ☆80Nov 2, 2019Updated 6 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- ☆15Sep 4, 2024Updated last year
- Scripts to execute enumeration via LFI☆92Apr 8, 2019Updated 6 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago
- Some scripts and exploits☆148Jul 9, 2018Updated 7 years ago
- All related files and slides for past talks☆44Dec 14, 2025Updated 2 months ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- Flunym0us is a Vulnerability Scanner for Wordpress and Moodle designed by Flu Project Team. Flunym0us has been developed in Python. Flun…☆28Jan 15, 2017Updated 9 years ago
- Encode powershell payload into bat files☆155Feb 1, 2018Updated 8 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- ☆29Mar 15, 2017Updated 8 years ago
- Bulk hostname lookup using shodan☆14Jun 1, 2022Updated 3 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 12 years ago
- python tools to assist in penetration testing☆14Jan 19, 2026Updated last month
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago