c0rnf13ld / ipmiPwner
Exploit to dump ipmi hashes
☆34Updated 2 years ago
Alternatives and similar repositories for ipmiPwner:
Users that are interested in ipmiPwner are comparing it to the libraries listed below
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- CLI monitor for windows process- & file activity☆85Updated 4 years ago
- A cheatsheet for NetExec☆116Updated 2 months ago
- C# implementation of harmj0y's PowerView☆25Updated 5 years ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆52Updated last year
- generate payloads that force authentication against an attacker machine☆105Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 3 months ago
- KeePass 2.X dumper (CVE-2023-32784)☆17Updated last year
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆56Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆41Updated last year
- Get a reverse shell using PostgreSQL☆18Updated 8 months ago
- Joomla login bruteforce☆65Updated 9 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆51Updated 3 months ago
- ☆29Updated 4 years ago
- ☆35Updated 3 years ago
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- CVE-2023-2255 Libre Office☆57Updated last year
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆110Updated 2 years ago
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆13Updated 4 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆83Updated last year
- PowerShell & Python tools developed for CTFs and certification exams☆43Updated 2 months ago
- POC for CVE-2024-23897 Jenkins File-Read☆26Updated 2 months ago
- post/windows/manage/enable_rdp Metaploit module in Command prompt module☆29Updated 6 years ago
- ☆20Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆68Updated last year
- Powershell script to extract information from boot PXE☆138Updated 5 years ago
- ☆66Updated 3 years ago
- Repository for doing pen300 exercises☆17Updated 2 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆43Updated 5 months ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆85Updated 6 years ago