resurrecting-open-source-projects / nbtscanLinks
Scan networks searching for NetBIOS information
☆46Updated 3 years ago
Alternatives and similar repositories for nbtscan
Users that are interested in nbtscan are comparing it to the libraries listed below
Sorting:
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Updated 6 years ago
- ☆10Updated 8 years ago
- ☆25Updated 3 years ago
- Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)☆24Updated 4 years ago
- Windows offline filesystem hacking tool for Linux☆96Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆93Updated 4 years ago
- Windows Oracle Database Attack Toolkit☆80Updated 3 years ago
- Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler / Citrix ADC to CVE-2023-3519☆85Updated 2 years ago
- It's easy as cake to dump your secrets☆49Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆23Updated 3 years ago
- Windows 权限提升 BadPotato☆14Updated 4 years ago
- Repository of CVE found by OCD people☆83Updated 6 months ago
- CVE-2023-20198 & 0Day Implant Scanner☆32Updated last month
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆46Updated last year
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Updated 3 years ago
- A port scanner written purely in PowerShell.☆82Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆44Updated last year
- Memory Scaner☆65Updated 3 years ago
- Windows Privilege Escalation☆70Updated 3 years ago
- ☆64Updated 3 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆34Updated last year
- 👀CVE Simple List☆74Updated this week
- Router socks. One port socks for all the others.☆69Updated last year
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients (CVE-2023-51385)☆51Updated 2 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆39Updated 2 years ago
- Web shell generator and command line interface.☆85Updated 5 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated 2 years ago
- Zimbra CVE-2022-37042 Nuclei weaponized template☆21Updated 3 years ago