Flexible tool framework for any vanilla discovery IP protocol
☆72May 19, 2024Updated last year
Alternatives and similar repositories for UniversalScanner
Users that are interested in UniversalScanner are comparing it to the libraries listed below
Sorting:
- API for Asset Service☆15Aug 15, 2024Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- 批量扫描url是否存在sql注入问题☆15Nov 29, 2022Updated 3 years ago
- Random experiments and shenanigans☆13Dec 6, 2025Updated 3 months ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 9 months ago
- Android Kernel Vulnerability (CVE-2019-2215) temporary root PoC☆14Dec 21, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- ☆18Jul 4, 2019Updated 6 years ago
- ☆18Mar 26, 2024Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 2 months ago
- Microsoft Entra ID Temporary Access Pass (TAP) Onboarding using ASP.NET Core and Microsoft Graph☆19May 10, 2025Updated 10 months ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Jun 9, 2023Updated 2 years ago
- Log4j Shield - fast ⚡, scalable and easy to use Log4j vulnerability CVE-2021-44228 finder and patcher☆13Dec 23, 2021Updated 4 years ago
- ☆13Jan 11, 2024Updated 2 years ago
- Termux auto install Script with non errer's !! everything in this folder has #GottModusTermux, self-tested and the installertions command…☆12Oct 21, 2018Updated 7 years ago
- Python application, generating parallel corpus for any language pairs, can be used for training nmt (Neural Machine Translation) systems☆12Dec 8, 2022Updated 3 years ago
- Lexmark CVE-2023-26067☆28Aug 8, 2023Updated 2 years ago
- ☆145Oct 31, 2023Updated 2 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- ☆16Sep 16, 2022Updated 3 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- 利用 CVE-2024-0044 Android 权限提升下载任意目标App沙箱文件。☆14Sep 3, 2024Updated last year
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- Chrome extension for Neat Download Manager in the style of macOS☆16Mar 17, 2023Updated 3 years ago
- Kali NetHunter Install Tools☆17Dec 29, 2016Updated 9 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Mac OSX application to control the DNSCrypt Proxy☆12Oct 7, 2017Updated 8 years ago
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Aug 13, 2022Updated 3 years ago
- Sensitive Discoverer, a Burp extension to discovers sensitive information inside HTTP messages.☆50Jan 26, 2026Updated last month
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated 2 years ago
- PAM Backdoor☆32Mar 29, 2023Updated 2 years ago