redteam-project / lemLinks
Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits
☆45Updated 3 years ago
Alternatives and similar repositories for lem
Users that are interested in lem are comparing it to the libraries listed below
Sorting:
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 7 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- A tool to analyse JMX API security level.☆43Updated 11 years ago
- Automates credential skimming from service accounts in Windows Registry☆78Updated 5 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Updated 7 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆120Updated 6 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆80Updated 3 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Updated 8 years ago
- Python script to exploit CVE-2015-4852.☆31Updated 9 years ago
- The Outlook HTML Leak Test Project☆131Updated 7 years ago
- ☆22Updated 9 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 7 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 6 years ago
- ☆38Updated 5 years ago
- ☆29Updated 7 years ago
- Python script to detect bluekeep vulnerability (CVE-2019-0708) with TLS/SSL and x509 support☆27Updated 6 years ago
- public exploits☆35Updated 2 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- BlueKeep scanner supporting NLA☆165Updated 6 years ago
- Socks5 server over Websockets☆40Updated 7 years ago
- A collection of scripts used to interact with the Burp Rest API☆55Updated 6 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated last year
- Extension adds a new tab in Burp Suite called Extractor☆42Updated 6 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆141Updated 7 years ago
- Python tool to inject fake updates into unencrypted WSUS traffic☆113Updated 10 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Updated 6 years ago
- initial commit☆44Updated last year
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Updated 7 years ago