hahwul / metasploit-autopwnLinks
db_autopwn plugin of metasploit
☆234Updated 5 years ago
Alternatives and similar repositories for metasploit-autopwn
Users that are interested in metasploit-autopwn are comparing it to the libraries listed below
Sorting:
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆428Updated last year
- A library of pretexts to use on offensive phishing engagements.☆356Updated 5 years ago
- Simple php reverse shell implemented using binary .☆419Updated last year
- MS17-010☆271Updated 2 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆281Updated 10 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆537Updated 4 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆563Updated last year
- A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)☆745Updated last year
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆554Updated 2 years ago
- Collection of things made during my OSCP journey☆262Updated 7 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆124Updated 3 years ago
- An script to perform kerberos bruteforcing by using impacket☆451Updated 3 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆478Updated 4 years ago
- socks4 reverse proxy for penetration testing☆599Updated 6 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆412Updated last year
- BruteXSS is a tool written in python simply to find XSS vulnerabilities in web application. This tool was originally developed by Shawar …☆538Updated 4 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,606Updated 4 years ago
- Search gtfobins and lolbas files from your terminal☆461Updated 2 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆580Updated 10 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆244Updated 8 years ago
- ☆217Updated 4 years ago
- davtest (improved)- Exploits WebDAV folders☆113Updated 2 years ago
- A super small jsp webshell with file upload capabilities.☆300Updated 3 years ago
- Changes for Visual Studio 2013☆118Updated 10 years ago
- Updating MS08-067 Python exploit script☆105Updated 6 years ago
- Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribut…☆538Updated 3 years ago
- Default usernames and passwords for various systems (VoIP,IPMI,Oracle).☆432Updated last year
- RottenPotato local privilege escalation from service account to SYSTEM☆678Updated 7 years ago
- Exploit for zerologon cve-2020-1472☆667Updated 4 years ago
- Python script wrote to automate the process of generating various reverse shells.☆202Updated 3 years ago