phx / cvescanLinks
Easily scan for CVEs using nmap.
☆15Updated 3 years ago
Alternatives and similar repositories for cvescan
Users that are interested in cvescan are comparing it to the libraries listed below
Sorting:
- Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells…☆20Updated 2 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆51Updated 2 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆61Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- privilege escalation by piggy-backing user sudo requests☆16Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆32Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆73Updated last year
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆13Updated 5 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Updated last year
- ☆24Updated 3 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 3 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Linux Persistence Toolkit☆71Updated 3 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 2 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆14Updated 5 months ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Updated last year
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- brute force SSH public-key authentication☆79Updated 5 months ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- Custom pentesting tools☆25Updated 5 years ago