mainframed / TSO-BruteLinks
z/OS Mainframe TSO Logon panel account enumerator and brute forcer
☆30Updated 12 years ago
Alternatives and similar repositories for TSO-Brute
Users that are interested in TSO-Brute are comparing it to the libraries listed below
Sorting:
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆48Updated 2 years ago
- Mainframe Transfer: PROTOCOL☆28Updated 4 years ago
- Files compiled from the Logica breach investigation materials☆44Updated 6 years ago
- TN3270 MitM proxy and so much more☆14Updated 7 years ago
- A collection of interesting REXX scripts to ease the life a mainframe pentester☆26Updated 8 years ago
- Collection of materials related to IBM z/OS security☆44Updated 9 years ago
- Database of Internet Facing TN3270 Mainframes☆23Updated 10 years ago
- PSIKOTIK TSO User Enumerator☆17Updated 7 years ago
- CATSO/JCL wrapper for z/OS FTP logic attack☆26Updated 5 months ago
- Mainframe bruter and screen automation utility.☆43Updated 10 years ago
- PoC REXX Script to Help with z/OS System enumeration via OMVS/TSO/JCL.☆73Updated 2 months ago
- RACF and z/OS tools and info☆34Updated this week
- ☆12Updated last year
- Mainframe security auditing and scripts☆141Updated 7 years ago
- NMAP scripts for TN3270 interaction as well as NJE. Most notably TSO User Enumeration and Brute Force. CICS transaction ID enumeration an…☆26Updated 8 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Updated 8 years ago
- Next Generation of White Chapel☆21Updated 10 years ago
- CICSpwn is a tool to pentest a CICS Transaction servers on z/OS.☆87Updated 4 years ago
- ☆26Updated 5 years ago
- ☆30Updated 10 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆22Updated 8 years ago
- Big Iron Recon & Pwnage☆126Updated 3 years ago
- z/OS (mainframe) Network Job Entry (NJE) python library and example scripts.☆28Updated last year
- Privilege escalation tools on Mainframe☆83Updated 5 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Updated 9 years ago
- Here comes the paintrain!☆11Updated 9 years ago
- See here:☆42Updated 12 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Updated 9 years ago
- Custom scripts used during the scenario☆21Updated 4 years ago