phx / cvescan
Easily scan for CVEs using nmap.
☆13Updated 3 years ago
Alternatives and similar repositories for cvescan:
Users that are interested in cvescan are comparing it to the libraries listed below
- A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell option…☆14Updated last year
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 2 years ago
- ☆27Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- A swiss army knife for pentesting networks☆25Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 2 months ago
- Check robustness of your (their) Active Directory accounts passwords☆34Updated 3 weeks ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- wordlists for password cracking☆27Updated 2 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆32Updated 3 years ago
- An offensive security framework for writing payloads☆17Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Ethical hacking, CTF, tools & etc☆22Updated 4 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆17Updated 9 months ago
- Custom pentesting tools☆25Updated 4 years ago
- This is a simple C++ program that will copy clipboard data and upload it to a webserver of your choice!☆16Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 5 months ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆17Updated 3 years ago
- ☆12Updated 2 years ago
- ☆30Updated 4 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆17Updated 3 years ago
- x86_64 LKM linux rootkit☆16Updated last year