briskinfosec / ANSE-SCANNER
☆13Updated 7 years ago
Alternatives and similar repositories for ANSE-SCANNER:
Users that are interested in ANSE-SCANNER are comparing it to the libraries listed below
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- "HeaderScan" Burp Plugin☆16Updated 10 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Updated 5 years ago
- ☆14Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- C# Situational Awareness Script☆34Updated 5 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- ☆11Updated 7 years ago
- A collection of published exploits and proof-of-concept code.☆21Updated 7 years ago
- ARP ping detector on local network☆15Updated 12 years ago
- ☆13Updated 2 years ago
- SWF Vulnerability & Information Scanner☆20Updated 6 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- ☆11Updated 7 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆31Updated 10 months ago
- Reverse shell and rootkit☆19Updated 7 years ago
- Small and highly portable detection tests.☆11Updated 7 years ago
- Scans an internal network using massscan and nmap☆20Updated last year
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Updated 7 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- Incident Response Collections☆10Updated 6 years ago
- OfficeBrute - brute force protected word documents☆22Updated 7 years ago
- PoC ActiveX SVG Document Execution☆21Updated 6 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago