hahwul / metasploit-autopwnLinks
db_autopwn plugin of metasploit
☆243Updated 5 years ago
Alternatives and similar repositories for metasploit-autopwn
Users that are interested in metasploit-autopwn are comparing it to the libraries listed below
Sorting:
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆432Updated last year
- A library of pretexts to use on offensive phishing engagements.☆367Updated 6 years ago
- Python script wrote to automate the process of generating various reverse shells.☆202Updated 4 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆289Updated 10 years ago
- BruteXSS is a tool written in python simply to find XSS vulnerabilities in web application. This tool was originally developed by Shawar …☆547Updated 4 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆130Updated 3 years ago
- Python3 tool to perform password spraying using RDP☆658Updated 2 years ago
- davtest (improved)- Exploits WebDAV folders☆114Updated 2 years ago
- SNMP data gather scripts☆82Updated last year
- Collection of things made during my OSCP journey☆263Updated 7 years ago
- Default usernames and passwords for various systems (VoIP,IPMI,Oracle).☆434Updated last year
- Single Page Cheatsheet for common MSF Venom One Liners☆282Updated 6 years ago
- Simple php reverse shell implemented using binary .☆421Updated last year
- Shellshock exploit + vulnerable environment☆216Updated 2 years ago
- Search gtfobins and lolbas files from your terminal☆461Updated 3 years ago
- Containing Self Made Perl Reproducers / PoC Codes☆196Updated 5 years ago
- MS17-010☆272Updated 2 years ago
- Using this script, you can enumerate Usernames and passwords of Nosql(mongodb) injecion vulnerable web applications.☆172Updated 5 years ago
- A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)☆748Updated last year
- ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container☆138Updated 7 years ago
- RSMangler will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras.☆225Updated 6 years ago
- An script to perform kerberos bruteforcing by using impacket☆452Updated 3 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆547Updated 5 years ago
- Converts Nmap XML output to csv file, and other useful functions☆218Updated last year
- Search Exploitable Software on Linux☆231Updated 2 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆46Updated 10 years ago
- Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938)☆398Updated 5 years ago
- A free software to find the components installed in Joomla CMS, built out of the ashes of Joomscan.☆233Updated 2 years ago
- OpenSSH 2.3 < 7.7 - Username Enumeration☆42Updated last year
- Changes for Visual Studio 2013☆119Updated 10 years ago