mainframed / Scripts
Rexx scripts
☆12Updated 10 years ago
Alternatives and similar repositories for Scripts:
Users that are interested in Scripts are comparing it to the libraries listed below
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆47Updated last year
- RACF and z/OS tools and info☆33Updated 2 years ago
- Database of Internet Facing TN3270 Mainframes☆23Updated 9 years ago
- z/OS Mainframe TSO Logon panel account enumerator and brute forcer☆29Updated 11 years ago
- PSIKOTIK TSO User Enumerator☆17Updated 7 years ago
- Files compiled from the Logica breach investigation materials☆43Updated 6 years ago
- z/OS (mainframe) Network Job Entry (NJE) python library and example scripts.☆26Updated 7 months ago
- Mainframe Transfer: PROTOCOL☆28Updated 3 years ago
- Collection of materials related to IBM z/OS security☆44Updated 9 years ago
- A collection of interesting REXX scripts to ease the life a mainframe pentester☆25Updated 8 years ago
- CATSO/JCL wrapper for z/OS FTP logic attack☆24Updated last month
- ☆28Updated 9 years ago
- NMAP Patches and NSE Scripts☆19Updated 11 years ago
- Mainframe bruter and screen automation utility.☆42Updated 10 years ago
- ☆25Updated 4 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Updated 9 years ago
- TN3270 MitM proxy and so much more☆13Updated 6 years ago
- PoC REXX Script to Help with z/OS System enumeration via OMVS/TSO/JCL.☆68Updated 3 weeks ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Updated 13 years ago
- z/OS ReXX IRRXUTIL samples☆26Updated 3 months ago
- ☆12Updated 8 months ago
- NMAP scripts for TN3270 interaction as well as NJE. Most notably TSO User Enumeration and Brute Force. CICS transaction ID enumeration an…☆26Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- recon framework in ruby☆13Updated 13 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- a CMD shell in masm that listens on port 8080☆12Updated 4 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- ☆16Updated 9 years ago