hegusung / RPCScan
Tool to communicate with RPC services and check misconfigurations on NFS shares
☆64Updated 5 years ago
Alternatives and similar repositories for RPCScan:
Users that are interested in RPCScan are comparing it to the libraries listed below
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 5 years ago
- Privilege escalation using dmidecode☆20Updated 5 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- Verification tools for CVE-2016-1287☆33Updated 8 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆203Updated last year
- Metasploit msfvenom Bash Completions Generator☆42Updated 8 years ago
- ☆43Updated 8 years ago
- Dirbuster plugin for Burp Suite☆70Updated 8 years ago
- Splunk Web Shell☆51Updated 10 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- Nmap custom probes for better detecting SAP services☆135Updated last year
- Web-based check for Windows privesc vulnerabilities☆139Updated last year
- Security Research☆95Updated 5 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆53Updated 5 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 8 years ago
- Samba, NFS shares spider and grepper☆71Updated 6 years ago
- Python3 Metasploit automation library☆21Updated 2 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13☆63Updated 5 years ago
- ☆29Updated 7 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- Repo with various Red Team scripts☆146Updated 4 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- public exploits☆35Updated last year
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- ☆59Updated 4 years ago