nicolas-carolo / hsploit
An advanced command-line search engine for Exploit-DB
☆16Updated 2 years ago
Related projects: ⓘ
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- Modern problems require modern solutions☆31Updated last year
- ☆34Updated this week
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated last year
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Simple Karma Attack☆66Updated 3 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆65Updated 11 months ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆35Updated 4 years ago
- ☆70Updated this week
- A collection of curated Java Deserialization Exploits☆9Updated 6 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆34Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25Updated 5 years ago
- Automated Tools Pentest☆5Updated last year
- ☆74Updated this week
- Reverse shell generator☆23Updated 4 years ago
- ☆29Updated this week
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- automated penetration toolkit☆12Updated 8 years ago
- ☆50Updated this week
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆25Updated last year
- A defense tool - detect web shells in local directories via md5sum☆31Updated 5 years ago
- ☆29Updated this week
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆45Updated 6 years ago
- A quick reference script that can easily display reverse shells for different languages.☆19Updated 4 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆35Updated 4 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- python scripts for penetration testing☆11Updated 4 years ago