nccgroup / xcavator
A network data locater using credentials obtained during penetration tests
☆32Updated 11 years ago
Related projects ⓘ
Alternatives and complementary repositories for xcavator
- Password cracking utility☆51Updated 3 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 9 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 7 years ago
- Educational Python penetration testing framework☆10Updated 6 years ago
- All tools you needed during penetration testing.☆17Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆12Updated 10 years ago
- Universal stack-based buffer overfow exploitation tool☆22Updated 10 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Tool for automation of GUI-based testing.☆15Updated 9 years ago
- A simple tool to dump users in popular forums and CMS :)☆28Updated 6 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- SQL Injection without the pain of syringes.☆25Updated 7 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 4 years ago
- ssh session type for metasploit☆97Updated last year
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 7 years ago
- Optional plugins for MITMf☆15Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆15Updated 11 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- packetstormsecurity.net exploit archive 133ch3r☆23Updated 13 years ago
- Format string exploit generation☆9Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago