c0r3dump3d / osueta
A simple Python script to exploit the OpenSSH User Enumeration Timing Attack.
☆158Updated 4 years ago
Alternatives and similar repositories for osueta:
Users that are interested in osueta are comparing it to the libraries listed below
- Linux pentest tools☆86Updated 5 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- Script to identify hosts vulnerable to CVE-2018-10933☆232Updated 6 years ago
- A small python script to check for Cross-Site Tracing (XST)☆134Updated 9 years ago
- unix wildcard attacks☆132Updated 6 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Updated 7 years ago
- Fuzzbunch deployment for Debian - Intructions: Readme.md☆137Updated 3 years ago
- Penetration testing scripts☆142Updated 6 years ago
- Github for the scripts utilised during Penetration test☆235Updated 7 years ago
- Snarf man-in-the-middle / relay suite☆205Updated 8 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 8 years ago
- minimal script to help find script into the nse database☆130Updated 6 years ago
- SpiderLabs shared Nmap Tools☆229Updated 4 years ago
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆125Updated 6 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 5 years ago
- Common password pattern generator using strings list☆131Updated 4 years ago
- Hash cracker☆59Updated 7 years ago
- ☆224Updated 10 months ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 4 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆243Updated 10 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆333Updated last year
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆257Updated 4 years ago
- ☆122Updated 7 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆102Updated 7 years ago
- Socat can be used to establish a reverse shell with bash tab completion and full shell functionality☆152Updated 9 years ago
- Bash simulator to control a server using PHP system functions.☆101Updated 4 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 10 years ago