icryo / RFCpwnLinks
An enumeration and exploitation toolkit using RFC calls to SAP
☆40Updated 6 years ago
Alternatives and similar repositories for RFCpwn
Users that are interested in RFCpwn are comparing it to the libraries listed below
Sorting:
- Alphanumeric Encoder☆25Updated 7 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- AWS S3 Bucket/Object Finder☆25Updated 8 years ago
- API testing tool written with Python☆56Updated 8 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Automated 802.1x Bypass☆87Updated 5 years ago
- ☆37Updated 5 years ago
- automatic scan for hackthebox☆13Updated 6 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Capture all RabbitMQ messages being sent through a broker.☆32Updated 4 years ago
- LetMeOutOfYour.net Resources☆21Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Updated 5 years ago
- ☆21Updated 6 years ago
- My python3 implementation of a Forward Shell☆36Updated 7 years ago
- miscellaneous stuff☆21Updated 10 years ago
- Scripts for OSCE☆18Updated 7 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 6 years ago
- Utility script to test zip file upload functionality (and possible extraction of zip files) for vulnerabilities (aka Zip Slip)☆31Updated 6 years ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago
- Methods of C2☆22Updated 10 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Screenshot Shenanigans☆26Updated 8 years ago
- ☆16Updated 8 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 6 years ago
- Enumerate RIDs using pure Python☆32Updated 3 weeks ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated last year
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Updated 6 years ago