Tools developed to test the Redirect to SMB issue
☆84Jun 2, 2015Updated 10 years ago
Alternatives and similar repositories for SMBTrap
Users that are interested in SMBTrap are comparing it to the libraries listed below
Sorting:
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- A tool for calculating necessary SQL Server permissions☆23Feb 9, 2015Updated 11 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆143Aug 9, 2015Updated 10 years ago
- A tool to generate graph and other output from NMAP XML files☆116Mar 9, 2019Updated 6 years ago
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Operational toolset utilizing git's submodule feature☆57Feb 6, 2013Updated 13 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆686Oct 27, 2016Updated 9 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Oct 13, 2022Updated 3 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Jan 30, 2021Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- Image size issues plugin for Burp Suite☆95Jun 27, 2018Updated 7 years ago
- Windows Privesc Check - PowerShell☆67Apr 22, 2022Updated 3 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- pwning & info gathering via user browser☆39May 7, 2015Updated 10 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- ☆424Aug 29, 2017Updated 8 years ago
- Sniffs sensitive data from interface or pcap☆1,813Nov 2, 2023Updated 2 years ago
- General Scripts to help with various types of SQL Injection☆30Jan 31, 2014Updated 12 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆61Oct 16, 2015Updated 10 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 7 months ago
- ☆30Jul 17, 2018Updated 7 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Drag and Drop ClickJacking PoC development assistance tool.☆196Oct 1, 2020Updated 5 years ago
- Store Burp data and collaborate via git☆53Oct 31, 2019Updated 6 years ago