danigargu / explodingcanLinks
An implementation of NSA's ExplodingCan exploit in Python
☆266Updated 7 years ago
Alternatives and similar repositories for explodingcan
Users that are interested in explodingcan are comparing it to the libraries listed below
Sorting:
- Custom tools and projects about security☆110Updated 2 months ago
- Enyx SNMP IPv6 Enumeration Tool☆103Updated 2 years ago
- Domain user enumeration tool☆215Updated last year
- Basics of Windows privilege escalation☆133Updated 7 years ago
- Linux Privilege Escalation Tool☆185Updated 6 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆114Updated 4 years ago
- Just some exploits :P☆46Updated 4 years ago
- Exploits and advisories☆202Updated 2 weeks ago
- For all your network pentesting needs☆155Updated last year
- Linux Local Enumeration Script☆80Updated 5 years ago
- Penetration testing scripts☆145Updated 7 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆124Updated 6 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆125Updated 6 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- Common password pattern generator using strings list☆131Updated 4 years ago
- Windows Pentest Scripts☆232Updated 7 years ago
- Porting for Metasploit of the infamous Esteemaudit RDP Exploit☆111Updated 8 years ago
- Search Exploitable Software on Linux☆231Updated 2 years ago
- Collection of different exploits☆181Updated 4 years ago
- Handbook and survival guide for hacking over the wire, OSCP-style☆43Updated 4 years ago
- locate and attack Lync/Skype for Business☆345Updated 11 months ago
- An SNMPv3 User Enumerator and Attack tool☆254Updated 5 years ago
- Repo with various Red Team scripts☆145Updated 4 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆258Updated 4 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆204Updated 2 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆172Updated last month
- Linux post exploitation enumeration and exploit checking tools☆181Updated 5 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated last year
- PowerShell Empire mod to post-exploit the World!☆137Updated 6 years ago