foreni-packages / cisco-global-exploiter
cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches
☆43Updated 6 years ago
Alternatives and similar repositories for cisco-global-exploiter:
Users that are interested in cisco-global-exploiter are comparing it to the libraries listed below
- Metasploit Usage Wiki☆49Updated 9 years ago
- ☆20Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆61Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- A tool for netpens.☆29Updated 5 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- ☆56Updated 10 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆43Updated 9 years ago
- My collection of dockerfiles☆24Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- CVE-2016-1287 vulnerability test☆16Updated 8 years ago
- Weape-Wireless-EAP-Extractor☆26Updated 11 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Updated 7 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 7 years ago
- Collection of binaries and scripts found across the net☆21Updated 11 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- The initial conversation slides and menu of scenarios☆38Updated 3 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago