paulosgf / autoMetasploit
Ruby script to automate metasploit scanning, exploitation, and post-exploitation
☆19Updated 4 years ago
Alternatives and similar repositories for autoMetasploit:
Users that are interested in autoMetasploit are comparing it to the libraries listed below
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- ☆16Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- Red Team Infrastructure: Covenant C2☆10Updated 4 years ago
- ☆11Updated 4 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 4 years ago
- ☆21Updated last year
- Yet, Another Packer/Loader☆25Updated last year
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- ☆24Updated 4 years ago
- Magento Security Scanner☆15Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 5 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- ☆17Updated 4 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆14Updated 2 years ago
- Poc script for ProxyShell exploit chain in Exchange Server☆18Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 3 years ago
- A Python script to find tenant id an region from a list of domain names.☆12Updated 2 weeks ago