neox41 / WinEnumLinks
Script for Local Windows Enumeration
☆31Updated 7 years ago
Alternatives and similar repositories for WinEnum
Users that are interested in WinEnum are comparing it to the libraries listed below
Sorting:
- Parse .nessus file(s) and shows output in interactive UI☆163Updated 3 weeks ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆113Updated 5 years ago
- A Linux enumeration script for Hack The Box☆191Updated 6 years ago
- Python template to assist with buffer overflows☆72Updated 6 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 4 years ago
- ☆156Updated 2 months ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26Updated 5 years ago
- ☆160Updated 8 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 5 years ago
- OSCP Buffer Overflow in 30 minutes☆36Updated 6 years ago
- Passive internal reconnaissance tool☆72Updated 3 years ago
- 👹☆57Updated 4 years ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆34Updated 8 years ago
- oscp-ctf is a small collection of basic Bash scripts that make life easier and save time whether you are in the OSCP labs, HackThebox or …☆66Updated 6 years ago
- useful pentest note☆68Updated 2 months ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 6 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆91Updated 9 years ago
- Active Directory Lab for Penetration Testing☆54Updated 6 months ago
- ☆21Updated 3 years ago
- ☆37Updated 6 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆255Updated 3 years ago
- ☆45Updated last year
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆206Updated last year
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 5 years ago
- ☆54Updated 5 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆42Updated 11 months ago
- Small easy to find cheat sheet for Active directory exploitation☆44Updated 5 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆58Updated 8 years ago