noperator / panos-scannerLinks
Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.
☆128Updated last year
Alternatives and similar repositories for panos-scanner
Users that are interested in panos-scanner are comparing it to the libraries listed below
Sorting:
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆143Updated 2 years ago
- ☆67Updated 6 years ago
- A list of "secrets" from JWT sample code and readme files.☆56Updated 4 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- This script is a multi-threaded Okta password sprayer.☆72Updated last year
- Determine the running software version of a remote F5 BIG-IP management interface.☆67Updated last year
- Tools to assess the DNS security of web applications☆128Updated 2 years ago
- ☆148Updated 3 years ago
- Shell Simulation over Net-SNMP with extend functionality☆96Updated 4 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- ☆51Updated 3 years ago
- ☆54Updated 4 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 2 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆112Updated 2 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- Office 365 and Exchange Enumeration☆189Updated 6 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated last month
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆85Updated 2 years ago
- Python based BloodHound data importer☆146Updated 2 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆81Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Updated 5 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆121Updated 5 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆204Updated 2 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆177Updated 2 years ago
- ☆45Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆102Updated last year
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆94Updated last year
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Updated 4 years ago