netbiosX / Default-Credentials
Default usernames and passwords for various systems (VoIP,IPMI,Oracle).
☆423Updated 8 months ago
Alternatives and similar repositories for Default-Credentials:
Users that are interested in Default-Credentials are comparing it to the libraries listed below
- Collection of things made during my OSCP journey☆255Updated 7 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆569Updated 6 months ago
- Awesome Nmap Grep☆348Updated 5 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆475Updated 4 years ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆818Updated 2 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆558Updated 8 months ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆525Updated 2 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆688Updated 4 years ago
- socks4 reverse proxy for penetration testing☆568Updated 6 years ago
- Python 3.5+ DNS asynchronous brute force utility☆650Updated last year
- Wordlists that have been compiled using Commonspeak2. This repo is updated every time new wordlists are generated.☆522Updated 6 years ago
- Smart Install Exploitation Tool☆574Updated 3 years ago
- List DTDs and generate XXE payloads using those local DTDs.☆617Updated 10 months ago
- This repository contains all the supplement material for the book "The art of sub-domain enumeration"☆638Updated 5 years ago
- Local file inclusion exploitation tool☆813Updated last year
- kadimus is a tool to check and exploit lfi vulnerability.☆521Updated 4 years ago
- Active Directory ACL exploitation with BloodHound☆708Updated 3 years ago
- RSMangler will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras.☆216Updated 5 years ago
- Converts/manipulates/extracts data from a Nmap scan output.☆523Updated 8 months ago
- A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-s…☆433Updated 3 years ago
- An SNMPv3 User Enumerator and Attack tool☆249Updated 4 years ago
- Collection of different exploits☆181Updated 4 years ago
- Simple php reverse shell implemented using binary .☆402Updated last year
- ☆137Updated 7 years ago
- Wordlists for creating statistically likely username lists for use in password attacks and security testing☆1,000Updated 2 years ago
- Herramienta para evadir disable_functions y open_basedir☆401Updated last year
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆616Updated 3 years ago
- An automated target reconnaissance pipeline.☆428Updated last year
- Search gtfobins and lolbas files from your terminal☆456Updated 2 years ago
- A Powershell Privilege Escalation Enumeration Script.☆306Updated 6 years ago