nray-scanner / nray
nray distributed port scanner
☆149Updated last year
Related projects: ⓘ
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆197Updated last year
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆244Updated 2 years ago
- an asynchronous target enumeration tool☆239Updated last year
- ntlm relay attack to Exchange Web Services☆325Updated 6 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- CVE-2018-13379☆250Updated 5 years ago
- Proxy Unix applications in the terminal☆113Updated 3 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆200Updated 3 years ago
- A mini webserver with FTP support for XXE payloads☆326Updated 8 months ago
- ☆285Updated 3 years ago
- Easy files and payloads delivery over DNS☆410Updated 5 months ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆200Updated 7 months ago
- SNIcat☆124Updated 3 years ago
- Take a list of domains/subdomains and probe for working http/https server.☆184Updated 4 years ago
- a CLI for ephemeral penetration testing☆7Updated 4 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆209Updated 3 years ago
- Exploits and advisories☆188Updated 4 years ago
- Domain user enumeration tool☆212Updated 10 months ago
- Python automation of Docker.sock abuse☆210Updated last year
- SonicWall SSL-VPN Exploit☆173Updated 3 years ago
- goddi (go dump domain info) dumps Active Directory domain information☆427Updated 2 years ago
- Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]☆371Updated 4 years ago
- ☆167Updated 6 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆300Updated 2 years ago
- siberas JMX exploitation toolkit☆127Updated last year
- Burp with Friends☆99Updated last year
- ☆291Updated this week
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆420Updated 2 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆244Updated 3 months ago
- A Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆80Updated last week