hack3270 is a python3 based tool to manipulate tn3270 data streams, specifically to perform application penetration testing of mainframe CICS applications.
☆24Feb 21, 2026Updated last week
Alternatives and similar repositories for hack3270
Users that are interested in hack3270 are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable CICS Application☆31Mar 2, 2024Updated last year
- RACF Database Parser☆12Apr 4, 2024Updated last year
- PoC REXX Script to Help with z/OS System enumeration via OMVS/TSO/JCL.☆78Feb 21, 2026Updated last week
- ☆18Nov 2, 2024Updated last year
- ☆16Mar 9, 2023Updated 2 years ago
- z/OS Mainframe TPX panel account enumerator and brute forcer☆20Jan 10, 2018Updated 8 years ago
- ☆24Feb 11, 2021Updated 5 years ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to…☆45Jun 1, 2025Updated 8 months ago
- CATSO/JCL wrapper for z/OS FTP logic attack☆26Feb 18, 2025Updated last year
- Webshell agent in aspx and php☆28Dec 11, 2025Updated 2 months ago
- z/OS Mainframe TSO Logon panel account enumerator and brute forcer☆32May 24, 2013Updated 12 years ago
- zigi: The git interface for the rest of us!☆71Oct 7, 2025Updated 4 months ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- Python script to generate the HLASM/JCL needed to convert ANSI art to EBCDIC/TN3270 art!☆27Oct 21, 2025Updated 4 months ago
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 10 months ago
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 3 months ago
- ☆40Oct 8, 2024Updated last year
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- ☆51Jun 28, 2025Updated 8 months ago
- A simple example of building a blog using Rust, Axum, Tokio, and PostgreSQL.☆33Feb 9, 2025Updated last year
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆95May 9, 2023Updated 2 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 9 months ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆10Apr 17, 2021Updated 4 years ago
- BOF to steal Teams cookies☆123Nov 2, 2025Updated 3 months ago
- Serverless REST API Hyperledger☆12Jan 28, 2019Updated 7 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Deploy Hyperledger Fabric and Besu networks on Baremetal (and join them too)☆12Dec 14, 2025Updated 2 months ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 8 months ago
- A list of useful ressources to develop windows drivers☆18Aug 5, 2025Updated 6 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 9 months ago
- ☆14Sep 1, 2024Updated last year
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago