nccgroup / nmap-nse-vulnerability-scriptsLinks
NMAP Vulnerability Scanning Scripts
☆629Updated 3 years ago
Alternatives and similar repositories for nmap-nse-vulnerability-scripts
Users that are interested in nmap-nse-vulnerability-scripts are comparing it to the libraries listed below
Sorting:
- ☆436Updated 3 years ago
- PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)☆1,094Updated 2 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆352Updated 3 years ago
- Detector for Log4Shell exploitation attempts☆730Updated 3 years ago
- Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation☆1,199Updated 3 years ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,280Updated 6 months ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆801Updated last year
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆436Updated 2 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆489Updated 2 years ago
- CVE-2021-4034 1day☆2,014Updated 3 years ago
- ☆362Updated 2 years ago
- Collect information of Windows PC when doing incident response☆252Updated 2 years ago
- A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆400Updated 7 months ago
- Attack Surface Management since before Attack Surface Management was a thing☆650Updated this week
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,281Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆852Updated 3 years ago
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆384Updated 3 years ago
- Log4j Vulnerability Scanner for Windows☆158Updated last month
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆478Updated 3 months ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆787Updated 2 years ago
- A community sourced list of log4j-affected software☆1,124Updated 2 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,250Updated 2 years ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆931Updated 2 years ago
- SMBeagle - Fileshare auditing tool.☆721Updated 6 months ago
- Bash script to check if a domain or list of domains can be spoofed based in DMARC records☆331Updated 3 years ago
- ☆631Updated 2 years ago
- Dangerously fast DNS/network/port scanner☆909Updated 3 years ago
- log4j rce test environment and poc☆311Updated 3 years ago
- Simple local scanner for vulnerable log4j instances☆375Updated 3 years ago
- fully automated pentesting tool☆514Updated 2 years ago