lokendrasinghrawat / AutoBlue-MS17-010Links
This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010 AKA EternalBlue
☆12Updated 7 years ago
Alternatives and similar repositories for AutoBlue-MS17-010
Users that are interested in AutoBlue-MS17-010 are comparing it to the libraries listed below
Sorting:
- Python template to assist with buffer overflows☆72Updated 6 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 5 years ago
- OSCP Buffer Overflow in 30 minutes☆36Updated 6 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Updated 4 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 4 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26Updated 5 years ago
- Passive internal reconnaissance tool☆72Updated 3 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 5 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated last year
- ☆54Updated 5 years ago
- ☆159Updated 8 years ago
- ☆98Updated 10 months ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆18Updated 6 years ago
- 👹☆57Updated 4 years ago
- oscp-ctf is a small collection of basic Bash scripts that make life easier and save time whether you are in the OSCP labs, HackThebox or …☆66Updated 6 years ago
- Weaponizing Splunk with reverse and bind shells.☆182Updated 8 years ago
- Used to check for TCP and UDP egress filtering on both windows and unix client systems☆147Updated 4 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Updated 5 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆204Updated last year
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆42Updated 5 years ago
- Some random exploits that may or may not be useful. Not responsible for misuse.☆21Updated 7 years ago
- Custom checklists, cheatsheets, links, and scripts☆127Updated 6 years ago
- Nessus Parser☆57Updated 8 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 6 years ago
- Script for Local Windows Enumeration☆31Updated 7 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆248Updated last year
- LinkedIn reconnaissance tool☆55Updated 4 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆91Updated 9 years ago
- ☆173Updated 7 years ago
- ☆32Updated 2 years ago