maaaaz / patator-windows
The great patator tool compiled for Windows
☆26Updated 8 years ago
Alternatives and similar repositories for patator-windows:
Users that are interested in patator-windows are comparing it to the libraries listed below
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆22Updated 6 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- A web app scanner☆26Updated 11 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆35Updated 5 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Updated 5 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- pentest toolbox☆28Updated 2 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Tool to recursively download versioned source code from .svn directories (pre Subversion-1.7 "WC-NG" format)☆8Updated 10 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- Go command line app to exploit file upload vulnerability☆12Updated 8 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆57Updated 5 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆17Updated 11 years ago
- AIL framework - Analysis Information Leak framework☆8Updated 7 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆23Updated 7 years ago