neox41 / WinEnumLinks
Script for Local Windows Enumeration
☆32Updated 7 years ago
Alternatives and similar repositories for WinEnum
Users that are interested in WinEnum are comparing it to the libraries listed below
Sorting:
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- pentest tools☆41Updated 7 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆48Updated 5 years ago
- Just some exploits :P☆46Updated 4 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆45Updated 10 years ago
- Enyx SNMP IPv6 Enumeration Tool☆102Updated 2 years ago
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- ☆150Updated last year
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 5 years ago
- Parse .nessus file(s) and shows output in interactive UI☆153Updated 2 months ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆32Updated 7 years ago
- Domain user enumeration tool☆215Updated last year
- Learnings from OSCP and other random stuff.☆31Updated last year
- Python template to assist with buffer overflows☆71Updated 5 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- A list of "secrets" from JWT sample code and readme files.☆55Updated 4 years ago
- 👹☆56Updated 3 years ago
- ☆79Updated 5 years ago
- Merges multiple .nessus files into one file.☆45Updated 2 years ago
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- ☆21Updated 2 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010 AKA EternalBlue☆12Updated 6 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆40Updated 4 months ago
- Nessus Parser☆56Updated 7 years ago
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- Powershell function to pull the local admin passwords from LDAP, stored there by LAPS.☆119Updated 5 years ago
- Obfuscated Penetration Testing PowerShell scripts☆147Updated 7 months ago