Scripts to execute enumeration via LFI
☆92Apr 8, 2019Updated 7 years ago
Alternatives and similar repositories for LFI-Enum
Users that are interested in LFI-Enum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Full Antivirus Evasion for Mimikatz☆14Mar 10, 2017Updated 9 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- ☆16May 3, 2021Updated 4 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 3 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆239Dec 8, 2022Updated 3 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 7 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 7 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- linikatz is a tool to attack AD on UNIX☆597Oct 19, 2023Updated 2 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- Red Teaming Experiments / Offensive Security / OSCP & Pentesting Cheat Sheets and more☆18Jan 11, 2019Updated 7 years ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆26May 8, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆19Mar 16, 2021Updated 5 years ago
- unix SSH post-exploitation 1337 tool☆141Dec 16, 2018Updated 7 years ago
- ☆19Oct 5, 2020Updated 5 years ago
- Messy BurpSuite plugin for SQL Truncation vulnerabilities.☆64Apr 17, 2020Updated 6 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- InfiniteWP Client < 1.9.4.5 - Authentication Bypass☆21Jul 28, 2021Updated 4 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49May 15, 2018Updated 7 years ago
- Wraps github api for openly available information about an organization, user, or repo☆128May 22, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆660Feb 1, 2025Updated last year
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆424Updated this week
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- A webshell framework for penetration testers.☆301Aug 10, 2025Updated 8 months ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Nov 29, 2020Updated 5 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆328Apr 23, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,335Dec 6, 2023Updated 2 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆732Apr 14, 2019Updated 7 years ago
- Active Directory ACL exploitation with BloodHound☆760Nov 18, 2021Updated 4 years ago
- Office 365 and Exchange domain federation enumeration tool☆13Sep 6, 2023Updated 2 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- Utility script to test zip file upload functionality (and possible extraction of zip files) for vulnerabilities (aka Zip Slip)☆31May 31, 2019Updated 6 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Jun 10, 2023Updated 2 years ago