ayoul3 / Rexx_scriptsLinks
A collection of interesting REXX scripts to ease the life a mainframe pentester
☆26Updated 8 years ago
Alternatives and similar repositories for Rexx_scripts
Users that are interested in Rexx_scripts are comparing it to the libraries listed below
Sorting:
- CATSO/JCL wrapper for z/OS FTP logic attack☆26Updated 5 months ago
- PSIKOTIK TSO User Enumerator☆17Updated 7 years ago
- TN3270 MitM proxy and so much more☆14Updated 7 years ago
- PoC REXX Script to Help with z/OS System enumeration via OMVS/TSO/JCL.☆73Updated 2 months ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆48Updated 2 years ago
- Mainframe Transfer: PROTOCOL☆28Updated 4 years ago
- z/OS Mainframe TSO Logon panel account enumerator and brute forcer☆30Updated 12 years ago
- Privilege escalation tools on Mainframe☆83Updated 5 years ago
- Custom scripts used during the scenario☆21Updated 4 years ago
- ☆12Updated last year
- Oracle Attacks Tool☆13Updated 8 years ago
- Mainframe bruter and screen automation utility.☆43Updated 10 years ago
- ☆26Updated 5 years ago
- Files compiled from the Logica breach investigation materials☆44Updated 6 years ago
- RACF and z/OS tools and info☆34Updated 3 years ago
- NMAP scripts for TN3270 interaction as well as NJE. Most notably TSO User Enumeration and Brute Force. CICS transaction ID enumeration an…☆26Updated 8 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Collection of scripts to p*wn mainframes☆16Updated 7 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- CICSpwn is a tool to pentest a CICS Transaction servers on z/OS.☆87Updated 4 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- ☆26Updated 5 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆22Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago