foreni-packages / cisco-global-exploiterView external linksLinks
cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches
☆44Dec 24, 2018Updated 7 years ago
Alternatives and similar repositories for cisco-global-exploiter
Users that are interested in cisco-global-exploiter are comparing it to the libraries listed below
Sorting:
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Sep 20, 2015Updated 10 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- PoC code for CVE-2018-9539☆20Nov 11, 2018Updated 7 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Oct 10, 2016Updated 9 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Sep 22, 2018Updated 7 years ago
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)☆46Jun 10, 2016Updated 9 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Aug 19, 2019Updated 6 years ago
- mixed packet injector tool☆20Dec 29, 2020Updated 5 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- A Github organization reconnaissance tool.☆218May 22, 2023Updated 2 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆42Feb 6, 2019Updated 7 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 2 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Sep 20, 2015Updated 10 years ago
- Dynamic DNS Update Bruteforce Tool☆29Feb 8, 2017Updated 9 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆24Jun 11, 2025Updated 8 months ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Simple C# reverse shell with shellcode and process injection☆39May 13, 2016Updated 9 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Poison, reset, spoof, redirect MITM script☆126Aug 5, 2023Updated 2 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Jul 10, 2016Updated 9 years ago
- Slightly modified version of https://raw.githubusercontent.com/killswitch-GUI/CobaltStrike-ToolKit/master/HTTPsC2DoneRight.sh☆12Nov 16, 2017Updated 8 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 5 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago