redteam-project / lemLinks
Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits
☆45Updated 3 years ago
Alternatives and similar repositories for lem
Users that are interested in lem are comparing it to the libraries listed below
Sorting:
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Updated 6 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- ☆29Updated 7 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆108Updated 7 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 7 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 6 years ago
- ☆22Updated 9 years ago
- Python tool to inject fake updates into unencrypted WSUS traffic☆114Updated 9 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated last year
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- The Outlook HTML Leak Test Project☆131Updated 7 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆83Updated 2 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Socks5 server over Websockets☆40Updated 6 years ago
- Automates credential skimming from service accounts in Windows Registry☆77Updated 4 years ago
- Splunk Web Shell☆51Updated 10 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- ☆59Updated 5 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- Post module for Metasploit to execute ELF in memory☆87Updated 6 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Updated 9 years ago
- Memcache hacking tool.☆47Updated 8 years ago