☆29Apr 20, 2018Updated 7 years ago
Alternatives and similar repositories for generateJenkinsExploit
Users that are interested in generateJenkinsExploit are comparing it to the libraries listed below
Sorting:
- ☆42Apr 20, 2018Updated 7 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17May 16, 2018Updated 7 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- Custom THP Dropper☆26Mar 27, 2018Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- ☆11Oct 23, 2019Updated 6 years ago
- ☆28Jun 10, 2016Updated 9 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- A POC reverse shell that can utilize multiple major web-browsers to provide remote access. Intended to demonstrate remote control of an e…☆13Dec 1, 2016Updated 9 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- Scrape real-time Dark Web data across Tor to your local kafka network☆14Mar 10, 2016Updated 9 years ago
- Docker container for DVWA☆13Jan 5, 2022Updated 4 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- The documents☆56Nov 2, 2017Updated 8 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Apr 14, 2017Updated 8 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆444Nov 30, 2023Updated 2 years ago
- Socks5 server over Websockets☆40Oct 17, 2018Updated 7 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 4 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆19Apr 20, 2016Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- ☆61Mar 16, 2018Updated 7 years ago
- pen testing scripts☆12Feb 7, 2021Updated 5 years ago
- Simple golang reverse shell☆20Jan 22, 2020Updated 6 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- The domain enumeration and scanning tool for hackers☆18Sep 29, 2024Updated last year