Scan for and exploit Consul agents
☆39Jun 11, 2019Updated 6 years ago
Alternatives and similar repositories for Constole
Users that are interested in Constole are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- BlueKeep scanner supporting NLA☆167Jul 18, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆17Oct 26, 2018Updated 7 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆103Dec 8, 2022Updated 3 years ago
- CCDC Red Team PWNboard☆77Mar 29, 2018Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Some scripts and exploits☆148Jul 9, 2018Updated 7 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 3 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 12 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- ☆11Feb 20, 2015Updated 11 years ago
- Scripts to execute enumeration via LFI☆92Apr 8, 2019Updated 7 years ago
- ☆26Dec 8, 2025Updated 5 months ago
- ☆29Mar 15, 2017Updated 9 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 7 years ago
- Burp Suite extension to discover assets from HTTP response.☆232Jan 22, 2025Updated last year
- ☆22Oct 22, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆22Nov 9, 2023Updated 2 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- public bugs/proof of concepts☆48Mar 10, 2021Updated 5 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 9 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆14Jul 29, 2016Updated 9 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Encode powershell payload into bat files☆155Feb 1, 2018Updated 8 years ago
- ☆82Nov 2, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- python tools to assist in penetration testing☆14Jan 19, 2026Updated 4 months ago
- Github for the scripts utilised during Penetration test☆237Jun 12, 2017Updated 8 years ago
- Dockerfiles for security tools☆52Nov 7, 2024Updated last year
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Standalone tool to explore the security model of Windows and its NT kernel. Use it to introspect privilege assignments and access right a…☆33May 21, 2019Updated 6 years ago
- ☆41May 16, 2018Updated 8 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆246Oct 22, 2021Updated 4 years ago