pentestmonkey / finger-user-enumLinks
Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another finger server.
☆49Updated 10 years ago
Alternatives and similar repositories for finger-user-enum
Users that are interested in finger-user-enum are comparing it to the libraries listed below
Sorting:
- Just some exploits :P☆47Updated 5 years ago
- Changes for Visual Studio 2013☆118Updated 10 years ago
- Updating MS08-067 Python exploit script☆105Updated 7 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆78Updated 5 years ago
- SNMP data gather scripts☆84Updated last year
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Updated 5 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆113Updated 5 years ago
- pentest tools☆41Updated 8 years ago
- ☆40Updated 10 years ago
- davtest (improved)- Exploits WebDAV folders☆119Updated 2 years ago
- This will give you shell access on the target system if redis server is not configured properly and faced on the internet without any aut…☆98Updated 6 years ago
- Enyx SNMP IPv6 Enumeration Tool☆106Updated 3 years ago
- Windows binaries from Kali Linux : http://git.kali.org/gitweb/?p=packages/windows-binaries.git;a=summary☆91Updated 5 years ago
- Windows Kernel Exploits☆69Updated 8 years ago
- Reverse Shell-able Windows exploits short POCs.☆35Updated 5 years ago
- mRemoteNG Config File Decrypt☆92Updated 3 years ago
- ☆37Updated 6 years ago
- Custom tools and projects about security☆110Updated 6 months ago
- Dirtycow exploit for both 32 and 64-bit☆29Updated 7 years ago
- ☆102Updated 6 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆147Updated 3 years ago
- A python based blind SQL injection exploitation script☆142Updated 6 years ago
- ☆129Updated 7 years ago
- Some random exploits that may or may not be useful. Not responsible for misuse.☆21Updated 7 years ago
- 👹☆57Updated 4 years ago
- OSWE Preparation☆38Updated 6 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆255Updated 3 years ago
- ☆33Updated 5 years ago
- Handbook and survival guide for hacking over the wire, OSCP-style☆44Updated 5 years ago
- ☆26Updated 2 years ago