This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently focusses on local exploitation of Solaris 8 on SPARC, but other version of Solaris are partially supported.
☆30May 29, 2015Updated 10 years ago
Alternatives and similar repositories for exploit-suggester
Users that are interested in exploit-suggester are comparing it to the libraries listed below
Sorting:
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- Tool for performing lots of DNS queries quickly☆18May 29, 2015Updated 10 years ago
- ☆17May 29, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- ☆40May 29, 2015Updated 10 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- Python-based tool to dump security information from Windows systems☆281Jun 22, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/yaptest☆66Feb 25, 2022Updated 4 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆206Nov 6, 2023Updated 2 years ago
- Tool to help identify timing attacks☆70Sep 4, 2011Updated 14 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆153Apr 20, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/unix-privesc-check☆1,082Feb 7, 2021Updated 5 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,499Aug 1, 2023Updated 2 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- ssl-cipher-suite enum is a Perl script to enumerate supported SSL cipher suites supported by network services (principally HTTPS)☆30Apr 5, 2021Updated 4 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- A multi-codec media fuzzing tool.☆43Oct 9, 2012Updated 13 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- A proof of concept exploit that tries to pop you a shell on a uftpd server between versions 2.6 and 2.10☆20Apr 16, 2020Updated 5 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- cewl wordlist generator from https://digi.ninja/projects/cewl.php☆29Jul 3, 2015Updated 10 years ago
- android kernel disassembler based on MAME emulator code☆39Nov 26, 2013Updated 12 years ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆33Jan 23, 2022Updated 4 years ago
- A PowerShell script that simplifies life and therefore... phishing.☆20Aug 16, 2022Updated 3 years ago
- Tool to check for applicable windows updates for a given machine in offline without dependency on WSUS or WUA.☆11Sep 23, 2020Updated 5 years ago
- Install popular tools used while pentesting & playing labs☆14Oct 8, 2021Updated 4 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago