gyaansastra / Print-Nightmare-LPEView external linksLinks
☆20Jul 2, 2021Updated 4 years ago
Alternatives and similar repositories for Print-Nightmare-LPE
Users that are interested in Print-Nightmare-LPE are comparing it to the libraries listed below
Sorting:
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆19Nov 13, 2025Updated 3 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 2 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆30Aug 13, 2015Updated 10 years ago
- Examples and Presentation for Austin Python Meetup 2017.03.08☆21Dec 7, 2018Updated 7 years ago
- ownCloud exploits for CVE-2023-49105☆36Dec 5, 2023Updated 2 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Sep 20, 2014Updated 11 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆206Oct 17, 2021Updated 4 years ago
- New generation parallel executer written in Go☆30Dec 18, 2023Updated 2 years ago
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago
- VIPROY - VoIP Pen-Test Kit for Metasploit Framework☆419Feb 4, 2022Updated 4 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆26Mar 17, 2019Updated 6 years ago
- ☆44Feb 6, 2025Updated last year
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- ☆15Sep 4, 2024Updated last year
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 5 months ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- McAfee ePolicy 0wner exploit code☆46Oct 11, 2018Updated 7 years ago
- Examples for Advanced Web Hacking Workshop☆34Dec 30, 2019Updated 6 years ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 3 years ago
- 🕷️MITMProxy + Ettercap = PWNd☆11Dec 5, 2018Updated 7 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- DeepAlign: Alignment-based Process Anomaly Correction Using Recurrent Neural Networks☆10Mar 25, 2023Updated 2 years ago
- ☆10Nov 28, 2021Updated 4 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- Metasploit Framework with Viproy installed.☆36Mar 15, 2017Updated 8 years ago
- Mixtures.info website source code.☆12Jan 28, 2025Updated last year
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated 3 weeks ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Create a screenshot of a remote desktop because NLA is disabled.☆39Oct 30, 2021Updated 4 years ago