mainframed / internetLinks
Database of Internet Facing TN3270 Mainframes
☆23Updated 10 years ago
Alternatives and similar repositories for internet
Users that are interested in internet are comparing it to the libraries listed below
Sorting:
- z/OS Mainframe TSO Logon panel account enumerator and brute forcer☆30Updated 12 years ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆48Updated 2 years ago
- RACF and z/OS tools and info☆34Updated 3 years ago
- Files compiled from the Logica breach investigation materials☆44Updated 6 years ago
- TN3270 MitM proxy and so much more☆14Updated 7 years ago
- ☆12Updated last year
- Mainframe bruter and screen automation utility.☆43Updated 10 years ago
- Collection of materials related to IBM z/OS security☆44Updated 9 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- ☆26Updated 5 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- CATSO/JCL wrapper for z/OS FTP logic attack☆26Updated 5 months ago
- PSIKOTIK TSO User Enumerator☆17Updated 7 years ago
- A collection of interesting REXX scripts to ease the life a mainframe pentester☆26Updated 8 years ago
- ☆15Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆23Updated 8 years ago
- Mainframe Transfer: PROTOCOL☆28Updated 4 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 4 months ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- apbleed☆24Updated 11 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Next Generation of White Chapel☆21Updated 10 years ago
- ☆30Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago