"Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios
☆25Aug 17, 2014Updated 11 years ago
Alternatives and similar repositories for bnat
Users that are interested in bnat are comparing it to the libraries listed below
Sorting:
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- Syscall Firewalls for VM Isolation☆11May 31, 2017Updated 8 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- ☆15Jun 17, 2016Updated 9 years ago
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 7 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- Veil Catapult is no longer supported☆75May 24, 2016Updated 9 years ago
- ☆20Jan 18, 2024Updated 2 years ago
- WHY?☆18Sep 4, 2016Updated 9 years ago
- Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to…☆22Aug 16, 2024Updated last year
- A simple, pure JavaScript implementation decoding PowerShell's SecureString objects for analysis.☆30Mar 31, 2023Updated 2 years ago
- ☆22May 29, 2020Updated 5 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- An example Mirage unikernel that runs as a Qubes AppVM☆23Nov 25, 2020Updated 5 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- A Java Server Faces (JSF) testing tool for decoding view state and creating view state attack vectors.☆32Dec 7, 2010Updated 15 years ago
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 7 years ago
- Ssh-agent unikernel for QubesOS☆22Dec 12, 2022Updated 3 years ago
- XSS exploitation tool - access victims through HTTP proxy☆160Mar 19, 2014Updated 11 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago