c0rnf13ld / ipmiPwnerView external linksLinks
Exploit to dump ipmi hashes
☆37Apr 21, 2023Updated 2 years ago
Alternatives and similar repositories for ipmiPwner
Users that are interested in ipmiPwner are comparing it to the libraries listed below
Sorting:
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Sep 22, 2021Updated 4 years ago
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- IOXIDResolver.py from AirBus Security☆261Oct 30, 2023Updated 2 years ago
- ☆18May 14, 2025Updated 8 months ago
- Tool for scanning domains for .git directories.☆17Oct 2, 2023Updated 2 years ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆20Mar 24, 2025Updated 10 months ago
- Platform independent library for interfacing windows security descriptors☆23Jan 2, 2026Updated last month
- this is some scripts for pentesting zabbix server☆13Feb 25, 2018Updated 7 years ago
- ☆252Feb 17, 2023Updated 2 years ago
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆25May 6, 2025Updated 9 months ago
- This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due…☆18Jan 24, 2024Updated 2 years ago
- C# implementation of harmj0y's PowerView☆44Mar 22, 2020Updated 5 years ago
- Modular Enumeration and Password Spraying Framework☆129Apr 10, 2024Updated last year
- LDAP Injection Vulnerability Application(Blog Sample Code)☆22Oct 4, 2018Updated 7 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- Script en Bash que automatiza todos los pasos para retransmitir la solicitud de autenticación SMB con el objetivo de obtener una Shell.☆23Jul 16, 2025Updated 6 months ago
- Collection of scripts to retrieve stored passwords from Veeam Backup☆144Jun 3, 2025Updated 8 months ago
- A red team emulation tool deveoped by CyCraft Technology☆25Apr 18, 2024Updated last year
- Kerberos manipulation library in pure Python☆305Oct 29, 2025Updated 3 months ago
- WPAUDIT: Advanced WordPress security auditing suite & vulnerability scanner. Automates pentesting with Nmap, WPScan, Nuclei, SQLMap. Comp…☆34May 27, 2025Updated 8 months ago
- Shell Simulation over Net-SNMP with extend functionality☆99Jan 18, 2021Updated 5 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Dec 18, 2023Updated 2 years ago
- My personal collection of nuclei templates made for fuzzing.☆29Sep 6, 2024Updated last year
- Minimal web server enumeration & attack surface detection tool based on results of nmap.☆38Sep 24, 2024Updated last year
- Buy Book Online Project uses MVC2 Design Pattern☆17Oct 8, 2022Updated 3 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- CVE-2023-2255 Libre Office☆63Jul 10, 2023Updated 2 years ago
- ☆114Nov 19, 2023Updated 2 years ago
- ☆287Jan 7, 2015Updated 11 years ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆30Feb 7, 2025Updated last year
- Using Discord as a C2 - Proof of Concept☆64Dec 29, 2022Updated 3 years ago
- ☆40Oct 8, 2024Updated last year