julienblitte / UniversalScannerLinks
Flexible tool framework for any vanilla discovery IP protocol
☆71Updated last year
Alternatives and similar repositories for UniversalScanner
Users that are interested in UniversalScanner are comparing it to the libraries listed below
Sorting:
- Script en Bash que automatiza todos los pasos para retransmitir la solicitud de autenticación SMB con el objetivo de obtener una Shell.☆23Updated 6 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆57Updated last year
- Postfix SMTP Smuggling - Expect Script POC☆22Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Updated 3 years ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Updated last year
- Monitor your target continuously for new subdomains!☆25Updated 2 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated last year
- The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The…☆27Updated 2 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Updated 2 years ago
- hiding in plain sight: part 2☆44Updated last year
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated 2 years ago
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆89Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 4 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆34Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- zyxel_ipc_camera_pwn☆21Updated 3 years ago
- A Red Teaming tool focused on profiling the target.☆29Updated 3 weeks ago
- ☆54Updated 2 years ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Updated 2 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Updated 3 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- ☆56Updated last year
- Searching .evtx logs for remote connections☆24Updated 2 years ago