Cisco Unfied Call Manager enumeration
☆24Jul 13, 2022Updated 3 years ago
Alternatives and similar repositories for CUCMe
Users that are interested in CUCMe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Sep 14, 2023Updated 2 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- ☆128Mar 1, 2023Updated 3 years ago
- ☆22Dec 30, 2025Updated 2 months ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆80Mar 30, 2023Updated 2 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆28Apr 6, 2022Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- A robust Red Team proxy written in Go.☆164Dec 26, 2021Updated 4 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆94Aug 1, 2022Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- ☆20Jul 24, 2022Updated 3 years ago
- ☆64Jan 2, 2024Updated 2 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆140Mar 19, 2024Updated 2 years ago
- Rogue Synergy server☆18Mar 8, 2017Updated 9 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆31Mar 2, 2022Updated 4 years ago
- ☆36May 27, 2024Updated last year
- ☆60Aug 11, 2023Updated 2 years ago
- A Python Obfuscator through AST modification☆26Nov 15, 2019Updated 6 years ago
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆59Apr 29, 2023Updated 2 years ago
- ☆71Nov 20, 2020Updated 5 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 4 months ago
- ☆28Dec 28, 2017Updated 8 years ago
- wo ee cve-2022-2185 gitlab authenticated rce☆80Jul 29, 2022Updated 3 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆219Mar 30, 2022Updated 3 years ago
- Golang search engine scraper intended for identification of published ClickOnce deployments☆92Nov 19, 2024Updated last year
- Beacon Object File PoC implementation of KillDefender☆235Apr 12, 2022Updated 3 years ago