horshark / akb-explorer
A command line tool to search AttackerKB.
☆52Updated 4 years ago
Alternatives and similar repositories for akb-explorer:
Users that are interested in akb-explorer are comparing it to the libraries listed below
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆64Updated 3 years ago
- ☆81Updated 5 years ago
- Some of the best web shells that you might need☆45Updated 6 years ago
- Buffer Overflows☆29Updated 4 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago
- 👹☆56Updated 3 years ago
- Reconnaissance and Enumeration automation script☆51Updated 4 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 4 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- ☆36Updated last year
- ☆31Updated 4 years ago
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆42Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆62Updated 5 years ago
- Showcase of DNS Exfiltration and Infiltration☆46Updated 4 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 3 years ago
- OSWE Preparation☆37Updated 5 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆41Updated last year
- Preparation for OSWE☆42Updated 5 years ago
- ☆48Updated 10 months ago
- Windows Kernel Exploits☆66Updated 7 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 6 years ago
- ☆62Updated 4 years ago
- ☆66Updated 3 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆44Updated 9 years ago
- Reverse Shell-able Windows exploits short POCs.☆31Updated 4 years ago
- ☆44Updated 7 months ago
- Offensive Security Web Assessor Resources Repo☆23Updated last year
- ☆29Updated 4 years ago
- A python based blind SQL injection exploitation script☆137Updated 5 years ago