gvb84 / pbscan
Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.
☆160Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for pbscan
- unix wildcard attacks☆132Updated 6 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆146Updated 6 years ago
- Automates some pentest jobs via nmap xml file☆322Updated 6 years ago
- Check for valid credentials across a network over SMB☆256Updated 10 months ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆206Updated 8 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆123Updated 6 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆283Updated 5 years ago
- Upgrade your netcat shell today!☆59Updated 7 years ago
- A curated list of rootkits found on Github and other sites.☆62Updated 7 years ago
- Snarf man-in-the-middle / relay suite☆202Updated 8 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- Port of eternal blue exploits to powershell☆149Updated 7 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆205Updated 6 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆117Updated 6 years ago
- Next Generation Firewall Audit and Bypass Tool☆260Updated 7 years ago
- Remote Recon and Collection☆447Updated 6 years ago
- A JBoss script for obtaining remote shell access☆170Updated 4 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆139Updated 9 years ago
- ☆100Updated 6 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆167Updated 9 months ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆286Updated last week
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆165Updated 7 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆185Updated 5 years ago
- Multi-threaded SSH Password Auditor☆92Updated 10 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆91Updated 8 years ago
- Meterpreter Scripts that I'm working on☆172Updated 5 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Updated 6 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆85Updated 8 years ago