amriunix / CVE-2007-2447Links
CVE-2007-2447 - Samba usermap script
☆60Updated 5 years ago
Alternatives and similar repositories for CVE-2007-2447
Users that are interested in CVE-2007-2447 are comparing it to the libraries listed below
Sorting:
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- Changes for Visual Studio 2013☆119Updated 10 years ago
- Powershell crazy and sometimes diabolic scripts☆159Updated 5 years ago
- Collection of username lists for enumerating kerberos domain users☆100Updated 7 years ago
- ☆82Updated 5 years ago
- Squid Pivoting Open Port Scanner☆86Updated 10 months ago
- Juicy Potato for x86 Windows☆126Updated 5 years ago
- ☆162Updated 3 years ago
- brute-forcing su for fun and possibly profit☆98Updated 6 years ago
- ☆172Updated 5 months ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆95Updated 4 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆65Updated 4 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆31Updated 5 years ago
- Windows Kernel Exploits☆67Updated 8 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆138Updated 3 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆46Updated last year
- ☆48Updated last year
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆47Updated 10 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 4 years ago
- Don't expect much :) Just expect to learn new things!☆63Updated 4 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- ☆108Updated last year
- Proof of Concept for CVE-2019-18634☆223Updated 4 years ago
- Simple forward and reverse shells that can be compiled and used on pen tests to avoid AV and used to get better access.☆29Updated 12 years ago
- Scripts created to help with post exploitation of a Windows host☆99Updated 4 years ago
- Handy Stored Password Decryption Techniques☆157Updated 4 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆146Updated 4 years ago
- Aspx reverse shell☆115Updated 5 years ago
- ☆220Updated 5 years ago
- Dumping LAPS from Python☆278Updated 2 years ago