this is some scripts for pentesting zabbix server
☆13Feb 25, 2018Updated 8 years ago
Alternatives and similar repositories for zabbix_test
Users that are interested in zabbix_test are comparing it to the libraries listed below
Sorting:
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆26Sep 23, 2018Updated 7 years ago
- Checks for signature requirements over LDAP☆98Oct 11, 2022Updated 3 years ago
- Winning submission for the GitHub Security Lab CTF 4: CodeQL and Chill - The Java Edition☆19Jun 25, 2020Updated 5 years ago
- automatic privilege escalation by pspy☆23Jan 19, 2022Updated 4 years ago
- Serverless Workshop☆16Dec 8, 2022Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- reverse socks tunneler with ntlm and proxy support☆28Nov 24, 2019Updated 6 years ago
- notes☆27Oct 10, 2022Updated 3 years ago
- show which process did what DNS queries☆36Jan 25, 2018Updated 8 years ago
- It's a simple tool for test vulnerability shellshock☆119Mar 18, 2021Updated 4 years ago
- Presentations from the CX Security Labs team☆35Jul 24, 2025Updated 7 months ago
- Laravel RCE exploit. CVE-2018-15133☆34Mar 22, 2022Updated 3 years ago
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆35Feb 4, 2023Updated 3 years ago
- Exploit to dump ipmi hashes☆37Apr 21, 2023Updated 2 years ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆27May 23, 2023Updated 2 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Examples for Advanced Web Hacking Workshop☆34Dec 30, 2019Updated 6 years ago
- Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification.☆148May 11, 2022Updated 3 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆94Sep 19, 2022Updated 3 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Mar 26, 2022Updated 3 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- ☆15Sep 4, 2024Updated last year
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- OSCP guide and Red Team assessment Guide☆37Jul 9, 2020Updated 5 years ago
- Mode-line stopwatch in Emacs☆12Aug 27, 2019Updated 6 years ago
- Spring Cloud Gateway < 3.0.7 & < 3.1.1 Code Injection (RCE)☆38Mar 4, 2022Updated 3 years ago
- Native Java-based deserialization exploit for WebLogic T3 (and T3S) listeners.☆35Mar 2, 2020Updated 5 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Exfiltrate files via DNS☆94Aug 29, 2013Updated 12 years ago
- Search Nmap and Metasploit scanning scripts.☆54Sep 18, 2017Updated 8 years ago
- Thread safe load-balancer package for Golang☆11Feb 13, 2023Updated 3 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- ☆11Jun 16, 2021Updated 4 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago