Web-based check for Windows privesc vulnerabilities
☆140May 14, 2023Updated 2 years ago
Alternatives and similar repositories for patch-checker
Users that are interested in patch-checker are comparing it to the libraries listed below
Sorting:
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆109Oct 10, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Nov 13, 2021Updated 4 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆205Nov 8, 2020Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating sys…☆492Jul 23, 2020Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Jan 7, 2021Updated 5 years ago
- A very fast and smart web directory and file enumeration tool written in C.☆141Sep 15, 2025Updated 5 months ago
- Windows active user credential phishing tool☆283Mar 10, 2020Updated 5 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- Penetration testing utility and antivirus assessment tool.☆315Apr 25, 2023Updated 2 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- Selenium based web scraper to generate passwords list☆51May 7, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆768Feb 16, 2021Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 5 months ago
- Perform automated network reconnaissance scans☆238May 4, 2023Updated 2 years ago
- An advanced graphical search engine for Exploit-DB☆120May 29, 2024Updated last year
- Exploits and advisories☆207Dec 29, 2025Updated last month
- A forensic evidence acquirer☆86Apr 14, 2021Updated 4 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago