phx / cvescanLinks
Easily scan for CVEs using nmap.
☆16Updated 4 years ago
Alternatives and similar repositories for cvescan
Users that are interested in cvescan are comparing it to the libraries listed below
Sorting:
- A shell script that mimics sudo and sends you back the password☆45Updated 3 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Updated 2 years ago
- Custom Metasploit logos☆54Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆30Updated last year
- Packet crafting, injection and sniffing tool☆70Updated 3 weeks ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell option…☆14Updated 2 years ago
- ☆32Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆178Updated this week
- Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells…☆21Updated 2 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆79Updated 3 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 3 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆36Updated 4 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆87Updated 4 years ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- CATANA - CUT your Wordlist!☆15Updated 3 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆135Updated 2 weeks ago
- ☆112Updated last year
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Rodan Exploitation Framework☆103Updated 2 months ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- WARZONE RAT 1.71 CRACKED by UNKNOWN-Remote Administration Trojan-RAT☆14Updated 5 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 3 years ago
- ☆20Updated last month
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆20Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago