Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever
☆124Nov 18, 2023Updated 2 years ago
Alternatives and similar repositories for eternal_check
Users that are interested in eternal_check are comparing it to the libraries listed below
Sorting:
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- ☆229May 10, 2018Updated 7 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- ☆182Feb 21, 2022Updated 4 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Feb 6, 2018Updated 8 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆152Oct 20, 2018Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- This is a concept poc of command and control server implemented over blockchain☆56Aug 13, 2019Updated 6 years ago
- ☆99May 3, 2018Updated 7 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- Brute forcer and shell deployer for WildFly☆100Mar 10, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Security Tool to detect arp poisoning attacks☆54Apr 15, 2018Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆126May 25, 2018Updated 7 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆126Feb 20, 2023Updated 3 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- a simple portforwarder in ps1 with embeded c# code☆90Jun 30, 2018Updated 7 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- A WebDAV PROPFIND C2 tool☆119Aug 27, 2019Updated 6 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago