oxagast / oxasploitsLinks
A number of exploits and tools I've written for CVEs accredited to Marshall Whittaker/oxagast
☆7Updated 2 weeks ago
Alternatives and similar repositories for oxasploits
Users that are interested in oxasploits are comparing it to the libraries listed below
Sorting:
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆69Updated 5 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 7 months ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆26Updated 5 years ago
- ☆12Updated last year
- A basic proxylogon scanner☆27Updated 3 years ago
- powershell tool for VM evasion☆42Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- ☆17Updated 2 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated 2 years ago
- 🎥 Spytruder: Advanced RTSP Camera Discovery and Vulnerability Assessment Tool☆17Updated 3 weeks ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆36Updated 7 months ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated last year
- wordlists for password cracking☆28Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 4 years ago
- Free Email Providers☆11Updated last year
- ☆42Updated 3 months ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- S3 bucket enumerator☆30Updated 6 years ago
- Very loud vBulletin exploit☆14Updated 4 years ago