redteam-project / lem
Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits
☆45Updated 2 years ago
Alternatives and similar repositories for lem:
Users that are interested in lem are comparing it to the libraries listed below
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 5 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 8 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆139Updated 7 years ago
- Splunk Dashboard for CobaltStrike logs☆87Updated 4 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Updated 5 years ago
- A tool to analyse JMX API security level.☆43Updated 10 years ago
- A simple script to decrypt stored passwords from Oracle WebLogic Server configuration files☆30Updated 8 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- WhiteBox CMS analysis☆69Updated last year
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆42Updated 8 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆55Updated 8 months ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- An extensible honeypot framework☆93Updated 2 years ago
- Ye olde root shell for ye olde httpd☆44Updated 9 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 5 years ago
- ☆59Updated 4 years ago
- The Outlook HTML Leak Test Project☆132Updated 6 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆106Updated 7 years ago
- ☆21Updated 8 years ago
- A weaponized version of CVE-2018-9206☆62Updated 6 years ago
- Created by Jeffrey Martin via the GitHub Connector☆49Updated last month
- ☆98Updated 6 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 2 years ago
- A bunch of scripts used for network defense during competitions.☆15Updated 9 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 6 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆52Updated 6 years ago