nccgroup / nmap-nse-vulnerability-scripts
NMAP Vulnerability Scanning Scripts
☆627Updated 3 years ago
Alternatives and similar repositories for nmap-nse-vulnerability-scripts:
Users that are interested in nmap-nse-vulnerability-scripts are comparing it to the libraries listed below
- ☆436Updated 3 years ago
- PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)☆1,076Updated last year
- Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation☆1,126Updated 2 years ago
- CVE-2021-4034 1day☆1,985Updated 2 years ago
- Detector for Log4Shell exploitation attempts☆732Updated 3 years ago
- Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)☆349Updated 3 years ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,025Updated 4 months ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,216Updated 2 months ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆792Updated 10 months ago
- Collect information of Windows PC when doing incident response☆252Updated last year
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆778Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆844Updated 3 years ago
- SMBeagle - Fileshare auditing tool.☆711Updated 2 months ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆780Updated 2 years ago
- A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆399Updated 3 months ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,573Updated 2 years ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,295Updated last month
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,447Updated last year
- ☆701Updated last month
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,083Updated 2 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆2,652Updated 7 months ago
- An introduction to Active Directory security☆644Updated 2 years ago
- Automated pentest reporting with custom Word templates, project tracking, and client management tools. Streamline your security workflows…☆837Updated 3 weeks ago
- BlueHound - pinpoint the security issues that actually matter☆730Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,935Updated 3 weeks ago
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆785Updated 11 months ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,116Updated 10 months ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,008Updated 2 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆1,972Updated 3 months ago
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆1,927Updated 7 months ago