☆12Oct 12, 2013Updated 12 years ago
Alternatives and similar repositories for smbexec-2
Users that are interested in smbexec-2 are comparing it to the libraries listed below
Sorting:
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Jun 24, 2016Updated 9 years ago
- Experimental PowerShell tools for Penetration Testing / Red Teaming☆22Jun 28, 2017Updated 8 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Sep 21, 2017Updated 8 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- ☆25Sep 28, 2020Updated 5 years ago
- ☆261Sep 6, 2017Updated 8 years ago
- A collection of bash scripts I've written☆28Jun 4, 2025Updated 9 months ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- ☆35Dec 3, 2024Updated last year
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- Linkedin tool to gather profile data, emphasis in network connections☆77Oct 23, 2015Updated 10 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Dec 5, 2014Updated 11 years ago
- Wifi Automated Fake HotSpot Hijacking with aicrack-ng, airbase, ssl-strip, and dns spoof in Python.☆42Jun 6, 2014Updated 11 years ago
- Ejercicios de SQL☆16Nov 29, 2025Updated 3 months ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Updated this week
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Scripts that cover the basics of interacting with the Threat Grid API☆11Jan 21, 2020Updated 6 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Office for Mac Macro Payload Generator☆244Sep 25, 2025Updated 5 months ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- Projects and POCs☆61Jul 14, 2014Updated 11 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- A CAPTCHA recognition demo in tensorflow.☆11Jun 13, 2017Updated 8 years ago