A brute force program to test weak accounts configured to access a JMX Registry
☆35Feb 1, 2017Updated 9 years ago
Alternatives and similar repositories for jmxbf
Users that are interested in jmxbf are comparing it to the libraries listed below
Sorting:
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Aug 16, 2016Updated 9 years ago
- My collection of dockerfiles☆24Feb 15, 2016Updated 10 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- AntiXSS for Java is a port of the Microsoft Anti-Cross Site Scripting (AntiXSS) v1.5 library for .NET applications. The library requires …☆16Jul 2, 2012Updated 13 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Aug 9, 2016Updated 9 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Apr 18, 2017Updated 8 years ago
- Material from our CANAPE workshop☆32Nov 26, 2018Updated 7 years ago
- Fileless web browser information extraction☆221Apr 23, 2018Updated 7 years ago
- ☆13Feb 17, 2016Updated 10 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Nov 13, 2018Updated 7 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Nov 15, 2024Updated last year
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Jun 10, 2016Updated 9 years ago
- Decrypt MITM SSL RDP and save to pcap☆53May 1, 2014Updated 11 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- Executes lateral movement through PowerPoint DCOM objects☆20Feb 3, 2018Updated 8 years ago
- ☆26Jul 9, 2024Updated last year
- CFURL Cache inspector for Burp Suite☆18Dec 8, 2020Updated 5 years ago
- Java Message Exploitation Tool☆511Jul 6, 2022Updated 3 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- JRE8u20_RCE_Gadget☆255Jul 1, 2016Updated 9 years ago
- A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses☆114May 27, 2017Updated 8 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆261Aug 6, 2016Updated 9 years ago
- Java RMI enumeration and attack tool.☆745Sep 28, 2017Updated 8 years ago
- Provides a simple Python based proxy for running DNS over HTTPS to Google's DNS over HTTPS service.☆39Mar 10, 2025Updated 11 months ago
- ☆23Apr 21, 2022Updated 3 years ago
- ☆19Oct 5, 2020Updated 5 years ago
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago