bao7uo / dell-emc_recoverpoint
Exploits for Dell EMC RecoverPoint enterprise data protection platform
☆13Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for dell-emc_recoverpoint
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 5 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Updated 3 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆36Updated 4 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 7 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- Methods of C2☆21Updated 9 years ago
- ☆19Updated 4 years ago
- Scripts for OSCE☆18Updated 5 years ago
- automatic scan for hackthebox☆14Updated 4 years ago
- ☆20Updated 5 years ago
- ☆0Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated 8 months ago
- Misc stuff☆10Updated 10 years ago
- Data exfiltration using reflective DNS resolution covert channel☆51Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆23Updated 10 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Updated 4 years ago
- ☆16Updated 7 years ago
- Remote Java classpath enumeration via deserialization☆22Updated last year
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆34Updated 6 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆14Updated 5 years ago
- Enumerate RIDs using pure Python☆30Updated 3 months ago
- My python3 implementation of a Forward Shell☆35Updated 5 years ago
- Security Advisories☆10Updated 5 years ago
- Group Policy Hijacking☆31Updated 6 years ago