pentestmonkey / exploit-suggester
This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently focusses on local exploitation of Solaris 8 on SPARC, but other version of Solaris are partially supported.
☆29Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for exploit-suggester
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 8 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20Updated 9 years ago
- Tool for performing lots of DNS queries quickly☆18Updated 9 years ago
- ☆16Updated 9 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 9 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆36Updated 9 years ago
- Automatically exported from code.google.com/p/yapscan☆11Updated 9 years ago
- Tool to help identify timing attacks☆68Updated 13 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Script to automate, manage, and multithread Nikto scans.☆58Updated 4 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆12Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- Random collection of exploit code, tools, scripts, etc.☆25Updated 9 years ago
- Create lists from nmap output.☆13Updated 3 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆91Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- ☆40Updated 9 years ago
- ssh session type for metasploit☆97Updated last year
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 6 months ago
- scripts for pentesting☆88Updated 6 years ago
- Metasploit Usage Wiki☆48Updated 9 years ago
- a collection of payloads for common webapps☆73Updated 11 years ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆8Updated 5 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆58Updated 7 years ago
- Automatically exported from code.google.com/p/yaptest☆68Updated 2 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- ☆55Updated 4 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Updated 6 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆74Updated 10 years ago