CICSpwn is a tool to pentest a CICS Transaction servers on z/OS.
☆87Oct 23, 2020Updated 5 years ago
Alternatives and similar repositories for cicspwn
Users that are interested in cicspwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Privilege escalation tools on Mainframe☆84Aug 24, 2019Updated 6 years ago
- A collection of interesting REXX scripts to ease the life a mainframe pentester☆28Jan 31, 2017Updated 9 years ago
- RACF and z/OS tools and info☆35Aug 5, 2025Updated 7 months ago
- z/OS Mainframe TPX panel account enumerator and brute forcer☆20Jan 10, 2018Updated 8 years ago
- z/OS - all things security☆86May 21, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- CATSO/JCL wrapper for z/OS FTP logic attack☆26Feb 18, 2025Updated last year
- PoC REXX Script to Help with z/OS System enumeration via OMVS/TSO/JCL.☆78Feb 21, 2026Updated last month
- NMAP scripts for TN3270 interaction as well as NJE. Most notably TSO User Enumeration and Brute Force. CICS transaction ID enumeration an…☆28Nov 9, 2016Updated 9 years ago
- Big Iron Recon & Pwnage☆125Nov 8, 2021Updated 4 years ago
- PSIKOTIK TSO User Enumerator☆17Aug 24, 2017Updated 8 years ago
- ☆30Aug 8, 2015Updated 10 years ago
- z/OS Mainframe TSO Logon panel account enumerator and brute forcer☆32May 24, 2013Updated 12 years ago
- Mainframe security auditing and scripts☆141Jul 30, 2018Updated 7 years ago
- The IBM z/OS CICS collection supports management of CICS resources and definitions in Ansible via the CMCI REST API provided by CICS.☆19Dec 24, 2025Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Mainframe bruter and screen automation utility.☆42Sep 28, 2014Updated 11 years ago
- Files compiled from the Logica breach investigation materials☆45Aug 14, 2018Updated 7 years ago
- The plugin to build and deploy CICS bundles in a Maven build.☆18Feb 16, 2026Updated last month
- z/OS (mainframe) Network Job Entry (NJE) python library and example scripts.☆28Mar 11, 2026Updated 2 weeks ago
- Collection of scripts to p*wn mainframes☆16Sep 20, 2017Updated 8 years ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆51Jun 6, 2023Updated 2 years ago
- Migrated to zowe/cics-for-zowe-client.☆16Feb 5, 2024Updated 2 years ago
- Mainframe Transfer: PROTOCOL☆28Mar 26, 2021Updated 5 years ago
- RACF Database Parser☆12Apr 4, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Database of Internet Facing TN3270 Mainframes☆23Jul 31, 2015Updated 10 years ago
- ☆15Oct 29, 2024Updated last year
- A collection of pentest tools and resources targeting Hadoop environments☆35Mar 2, 2017Updated 9 years ago
- Collection of materials related to IBM z/OS security☆45Dec 14, 2015Updated 10 years ago
- A CICS Map (BMS) tool to create maps with ANSI.☆27Oct 12, 2023Updated 2 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- ☆12Aug 29, 2025Updated 7 months ago
- ☆481Jan 29, 2025Updated last year
- Java framework for testing mainframe (TN3270) applications☆36Sep 26, 2012Updated 13 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 12 years ago
- Tool to pentest spark clusters☆32Jun 26, 2024Updated last year
- A CLI for the IBM Z HMC☆11Mar 20, 2026Updated last week
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Issues to consider when planning a red team exercise.☆614Aug 23, 2017Updated 8 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago