nccgroup / nmap-nse-vulnerability-scriptsLinks
NMAP Vulnerability Scanning Scripts
☆628Updated 3 years ago
Alternatives and similar repositories for nmap-nse-vulnerability-scripts
Users that are interested in nmap-nse-vulnerability-scripts are comparing it to the libraries listed below
Sorting:
- ☆435Updated 3 years ago
- PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)☆1,095Updated 2 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆353Updated 3 years ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,288Updated 7 months ago
- Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation☆1,209Updated 3 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆804Updated last year
- Detector for Log4Shell exploitation attempts☆730Updated 3 years ago
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆437Updated 2 years ago
- A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆400Updated 8 months ago
- ☆364Updated 2 years ago
- CVE-2021-4034 1day☆2,013Updated 3 years ago
- Scanners for Jar files that may be vulnerable to CVE-2021-44228☆349Updated 3 years ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,283Updated 2 years ago
- a drop-in replacement for Nmap powered by shodan.io☆3,098Updated 4 months ago
- Log4j Vulnerability Scanner for Windows☆159Updated 2 months ago
- A community sourced list of log4j-affected software☆1,127Updated 2 years ago
- log4j rce test environment and poc☆311Updated 3 years ago
- Dangerously fast DNS/network/port scanner☆913Updated 3 years ago
- SMBeagle - Fileshare auditing tool.☆723Updated 7 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,402Updated last year
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,140Updated 10 months ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆787Updated 2 years ago
- Collect information of Windows PC when doing incident response☆252Updated 2 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,787Updated 2 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,920Updated last year
- BlueHound - pinpoint the security issues that actually matter☆744Updated 2 years ago
- Identify privilege escalation paths within and across different clouds☆699Updated 2 months ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,033Updated 9 months ago
- DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover☆848Updated 2 years ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆490Updated 2 years ago