mzet- / z-field-manualLinks
Computer Network Exploitation (CNE) Field Manual
☆14Updated last year
Alternatives and similar repositories for z-field-manual
Users that are interested in z-field-manual are comparing it to the libraries listed below
Sorting:
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- ☆22Updated 2 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago
- A Python script to find tenant id an region from a list of domain names.☆15Updated 8 months ago
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆15Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Updated 3 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆38Updated 3 weeks ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆38Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- POC FortiOS SSL-VPN buffer overflow vulnerability☆27Updated 2 years ago
- CVE-2023-20198 & 0Day Implant Scanner☆31Updated 5 months ago
- ☆29Updated 2 years ago
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆27Updated 2 years ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- PoC for CVE-2021-3129 (Laravel)☆13Updated 4 years ago
- ☆25Updated 3 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated 10 months ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- ☆27Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 3 years ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year