dc414 / Upnp-Exploiter
A Upnp exploitation tool.
☆102Updated 4 years ago
Related projects: ⓘ
- ☆57Updated this week
- ☆138Updated this week
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 7 years ago
- ☆68Updated this week
- ssh session type for metasploit☆97Updated last year
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆47Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- ☆84Updated this week
- Automated HaveIbeenPwned lookups using theharvester results☆49Updated 6 years ago
- ssh public host key scanner using shodan☆116Updated 5 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 5 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Updated 7 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆52Updated 4 years ago
- try privilege escalation changing sudo command☆118Updated 6 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆58Updated 7 years ago
- ☆93Updated this week
- ☆29Updated this week
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆43Updated 5 years ago
- Miscellaneous tools and patches that I have written/hacked/forked over the years☆60Updated 12 years ago
- ☆78Updated this week
- ☆51Updated this week
- ☆42Updated this week
- Shell-style script to search exploit-db.com exploits.☆59Updated 2 weeks ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Updated 9 years ago
- ☆51Updated this week
- ☆123Updated this week
- ☆63Updated this week
- Reconnaissance scripts for penetration testing☆55Updated 9 years ago
- Python tools for interacting with a DarkComet Client☆53Updated 9 years ago