Web-based check for Windows privesc vulnerabilities
☆139May 14, 2023Updated 3 years ago
Alternatives and similar repositories for patch-checker
Users that are interested in patch-checker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆87Mar 9, 2021Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆110Oct 10, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 7 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆67Nov 13, 2021Updated 4 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating sys…☆490Jul 23, 2020Updated 5 years ago
- LetMeOutOfYour.net Resources☆21Apr 11, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆21Nov 13, 2019Updated 6 years ago
- Selenium based web scraper to generate passwords list☆51May 7, 2020Updated 6 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆202Nov 8, 2020Updated 5 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆770Feb 16, 2021Updated 5 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 3 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- Penetration testing utility and antivirus assessment tool.☆314Apr 25, 2023Updated 3 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- A forensic evidence acquirer☆86Apr 14, 2021Updated 5 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Aug 5, 2022Updated 3 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆250Jun 19, 2024Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆508Sep 23, 2025Updated 7 months ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Windows active user credential phishing tool☆284Mar 10, 2020Updated 6 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Jan 7, 2021Updated 5 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- A multithreaded, very fast and smart HTTP(S) directory and file bruteforcer written in C on top of libcurl☆141May 3, 2026Updated 2 weeks ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆817Aug 28, 2022Updated 3 years ago