超精简的POC扫描框架
☆10Aug 5, 2019Updated 6 years ago
Alternatives and similar repositories for HScan
Users that are interested in HScan are comparing it to the libraries listed below
Sorting:
- NST Vulnerability Scanner☆18Jan 30, 2019Updated 7 years ago
- 一个攻击框架☆10May 29, 2015Updated 10 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 11 months ago
- 分布式漏扫框架☆17Nov 7, 2017Updated 8 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Dec 16, 2022Updated 3 years ago
- Simple python script to scan some weak things.☆14Nov 2, 2015Updated 10 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆33Apr 1, 2018Updated 7 years ago
- Scans plugins directory for possible vulnerable plugins.☆22Dec 9, 2023Updated 2 years ago
- ☆14May 13, 2018Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- Parse scan results into python objects, i.e. Nessus, Nmap, testssl, metasploit, ...☆23Jan 4, 2020Updated 6 years ago
- 根据Golismero源码二次开发的分布式漏洞扫描器(调试版)☆18Jul 25, 2016Updated 9 years ago
- 通用的POC检测框架,有足够的POC,就可以找出相应的漏洞☆45Apr 27, 2016Updated 9 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Tool designed to study the answers of your DNS resolver and make easier the identification of techniques such as DNS Hijacking/Poisoning☆27Jan 6, 2019Updated 7 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago
- 多线程探测弱密码程序☆32Apr 28, 2020Updated 5 years ago
- 主机入侵检测系统(HIDS)☆31Feb 28, 2018Updated 8 years ago
- push☆24Apr 21, 2016Updated 9 years ago
- 多线程网站目录穷举扫描修改版☆26Jun 17, 2016Updated 9 years ago
- 一款存储HTTP请求入库的burpsuite插件☆29Apr 8, 2018Updated 7 years ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Oct 1, 2017Updated 8 years ago
- A framework for automating penetration testing using a plugin based architecture☆41May 20, 2022Updated 3 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆44Jun 29, 2017Updated 8 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 8 years ago
- DragonJAR Automatic Windows Forensic☆13May 23, 2017Updated 8 years ago
- A small two-file JSON serializer in C# that works on MonoDroid/MonoTouch☆11Jun 25, 2019Updated 6 years ago
- a poc framework to test hosts via zoomeye sdk☆32Jun 26, 2017Updated 8 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- Trigger automated Acunetix scans as part of your web application's build process☆32Aug 9, 2024Updated last year
- Get chrome passwords from chrome database in powershell☆33Apr 5, 2019Updated 6 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- DoS PoC's for SAP products☆51Jan 23, 2018Updated 8 years ago
- MongoDB Login Brute Forcer☆11Jun 22, 2014Updated 11 years ago
- A Django-based Foreign Exchange data toolkit. Part of the Valuehorizon application ecosystem.☆10Jul 6, 2022Updated 3 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- A tool to evaluate the password health of Active Directory accounts.☆43Nov 19, 2024Updated last year
- Sysmon Config Pusher - Modernized☆33Jan 7, 2026Updated last month