pentestmonkey / unix-security-file-parserLinks
Automatically exported from code.google.com/p/unix-security-file-parser
☆34Updated 10 years ago
Alternatives and similar repositories for unix-security-file-parser
Users that are interested in unix-security-file-parser are comparing it to the libraries listed below
Sorting:
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Updated 10 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30Updated 10 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Updated 5 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 10 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago
- Babel Scripting Framework☆43Updated 5 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 12 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66Updated last year
- Automatically performs the SMB relay attack☆73Updated 9 years ago
- ☆84Updated 10 years ago
- ☆17Updated 11 years ago
- Tool for performing lots of DNS queries quickly☆18Updated 10 years ago
- Custom stagers with python encrypting proxy☆40Updated 10 years ago
- Automated enumeration☆30Updated 4 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- Simple but effective word list transmutation command-line app. Feed it words, and mangle them into new variations quickly and easily!☆33Updated 9 years ago
- Ransack Post Exploitation Tool☆16Updated 9 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- Easy Window domain access☆51Updated 11 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Spray SMB with hashes, Then psexec☆32Updated 6 years ago
- WeakNet PHP Execution Shell☆31Updated 10 years ago
- A CTF VM that fights back☆19Updated 13 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Updated 8 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Updated 9 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆147Updated 10 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 8 years ago