localh0t / wildpwn
unix wildcard attacks
☆130Updated 6 years ago
Related projects: ⓘ
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 7 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆76Updated 7 years ago
- try privilege escalation changing sudo command☆118Updated 6 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆91Updated 8 years ago
- Shell-style script to search exploit-db.com exploits.☆59Updated last week
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆104Updated 9 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆239Updated 10 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆89Updated 10 years ago
- Yet another AV evasion tool☆118Updated 2 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆73Updated 10 years ago
- Snarf man-in-the-middle / relay suite☆201Updated 7 years ago
- Tool to help identify timing attacks☆68Updated 13 years ago
- A Metasploit auto auxiliary script☆102Updated last year
- Analysis Suite For EAP Enabled Wireless Networks☆120Updated 5 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆85Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆67Updated 6 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 5 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated last year
- ☆57Updated this week
- ☆138Updated 7 years ago
- Script to automate, manage, and multithread Nikto scans.☆57Updated 4 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆58Updated 7 years ago
- An automated SMB relay exploitation script.☆151Updated 7 years ago
- WhiteBox CMS analysis☆68Updated last year
- Implementing Kerberoast attack fully in python☆72Updated 5 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- Mimipenguin密码抓取神器☆26Updated 7 years ago