redteam-project / lemLinks
Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits
☆45Updated 3 years ago
Alternatives and similar repositories for lem
Users that are interested in lem are comparing it to the libraries listed below
Sorting:
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Updated 6 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆57Updated 11 months ago
- Python script to exploit CVE-2015-4852.☆30Updated 8 years ago
- Containerized pentesting tools☆45Updated 3 years ago
- ☆25Updated 4 years ago
- Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence☆22Updated 6 years ago
- Splunk Dashboard for CobaltStrike logs☆89Updated 4 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- Detect kerberos attacks in pcap files☆29Updated 9 years ago
- Socks5 server over Websockets☆40Updated 6 years ago
- Unified repository for different Metasploit Framework payloads☆48Updated 5 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- ☆59Updated 4 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 6 years ago
- A tool to analyse JMX API security level.☆43Updated 10 years ago
- Burp Suite extension to perform Kerberos authentication☆104Updated 11 months ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- Automates credential skimming from service accounts in Windows Registry☆76Updated 4 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- Public rules and samples for various automations through LimaCharlie.io☆13Updated 3 years ago
- ☆29Updated 7 years ago