redteam-project / lemLinks
Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits
☆45Updated 3 years ago
Alternatives and similar repositories for lem
Users that are interested in lem are comparing it to the libraries listed below
Sorting:
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Updated 7 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 6 years ago
- The Outlook HTML Leak Test Project☆131Updated 7 years ago
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- Socks5 server over Websockets☆40Updated 7 years ago
- Splunk Dashboard for CobaltStrike logs☆89Updated 4 years ago
- ☆58Updated 5 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 6 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆81Updated 2 years ago
- Automates credential skimming from service accounts in Windows Registry☆77Updated 5 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆94Updated 4 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆108Updated 8 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Updated 6 years ago
- ☆29Updated 7 years ago
- Unified repository for different Metasploit Framework payloads☆48Updated 5 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆52Updated 6 years ago
- Python script to detect bluekeep vulnerability (CVE-2019-0708) with TLS/SSL and x509 support☆27Updated 6 years ago
- A tool to analyse JMX API security level.☆43Updated 11 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago
- ☆25Updated 4 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated last year
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Updated 11 months ago
- Ex-pv8's☆64Updated 6 years ago