pentestmonkey / finger-user-enum
Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another finger server.
☆44Updated 9 years ago
Alternatives and similar repositories for finger-user-enum:
Users that are interested in finger-user-enum are comparing it to the libraries listed below
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- Changes for Visual Studio 2013☆117Updated 9 years ago
- Just some exploits :P☆46Updated 4 years ago
- pentest tools☆41Updated 7 years ago
- Updating MS08-067 Python exploit script☆104Updated 6 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆118Updated 3 years ago
- Windows Kernel Exploits☆66Updated 7 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- SNMP data gather scripts☆79Updated last year
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Updated 4 years ago
- Enyx SNMP IPv6 Enumeration Tool☆102Updated 2 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆31Updated 5 years ago
- Preparation for OSWE☆42Updated 5 years ago
- mRemoteNG Config File Decrypt☆83Updated 2 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆64Updated 3 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- davtest (improved)- Exploits WebDAV folders☆112Updated 2 years ago
- ☆37Updated 5 years ago
- ☆81Updated 5 years ago
- ☆128Updated 7 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 4 years ago
- Automatically exported from code.google.com/p/fuzzdb☆62Updated 2 years ago
- OSWE Preparation☆37Updated 5 years ago
- Custom tools and projects about security☆110Updated 4 years ago
- Juicy Potato for x86 Windows☆120Updated 5 years ago
- A list of "secrets" from JWT sample code and readme files.☆55Updated 4 years ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- Scripts created to help with post exploitation of a Windows host☆97Updated 4 years ago
- Dirtycow exploit for both 32 and 64-bit☆28Updated 6 years ago