bonsaiviking / NfSpy
ID-spoofing NFS client
☆291Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for NfSpy
- ☆188Updated 3 months ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆887Updated 4 years ago
- Easy 802.1Q VLAN Hopping☆365Updated 8 years ago
- Socat can be used to establish a reverse shell with bash tab completion and full shell functionality☆150Updated 8 years ago
- locate and attack Lync/Skype for Business☆334Updated last month
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆345Updated 3 months ago
- ☆235Updated 5 years ago
- unix wildcard attacks☆132Updated 6 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆288Updated 5 years ago
- ☆213Updated 5 months ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆234Updated last year
- Snarf man-in-the-middle / relay suite☆202Updated 8 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆390Updated 5 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆256Updated 3 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆277Updated 3 years ago
- Windows Pentest Scripts☆226Updated 6 years ago
- Rid_enum is a null session RID cycle attack for brute forcing domain controllers.☆234Updated 3 months ago
- An LDAP based Active Directory user and group enumeration tool☆303Updated last year
- Explore the network using VPNPivot tool☆268Updated 8 years ago
- Smart Install Exploitation Tool☆572Updated 2 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆559Updated 9 years ago
- Linux Privilege Escalation Tool☆180Updated 5 years ago
- Local UNIX PrivEsc Aggregation☆245Updated 8 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆520Updated 7 years ago
- ☆232Updated 4 years ago
- An SNMPv3 User Enumerator and Attack tool☆245Updated 4 years ago
- an asynchronous target enumeration tool☆239Updated last year
- Linux post exploitation enumeration and exploit checking tools☆176Updated 4 years ago
- Check for valid credentials across a network over SMB☆256Updated 10 months ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆168Updated 4 years ago