ernw / insinuator-snippetsLinks
A collection of code snippets used in blog posts.
☆54Updated 5 years ago
Alternatives and similar repositories for insinuator-snippets
Users that are interested in insinuator-snippets are comparing it to the libraries listed below
Sorting:
- ☆74Updated 2 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 11 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- Wrappers around smbclient and winexe with PTH support☆33Updated 9 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Python object interface to requests/responses recorded by Burp Suite☆37Updated 5 years ago
- A Burp Extender plugin, that will make binary soap objects readable and modifiable.☆29Updated 3 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 10 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Source Code Intelligence☆30Updated 7 years ago
- A simple little Python script that uses Impacket to check if SMBv1 is enabled on a remote host☆16Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Office 365 MFA capture toolkit☆12Updated 7 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Updated 8 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Updated 8 years ago
- Projects and POCs☆60Updated 10 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Verification tools for CVE-2016-1287☆33Updated 8 years ago
- Simple DDE object detector☆56Updated 7 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- put this here because archival reasons.☆28Updated 7 years ago