resurrecting-open-source-projects / nbtscan
Scan networks searching for NetBIOS information
☆32Updated last year
Related projects: ⓘ
- Windows Oracle Database Attack Toolkit☆79Updated 2 years ago
- Linux startup analyzer☆60Updated 2 years ago
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆77Updated 9 months ago
- pyForgeCert is a Python equivalent of the ForgeCert.☆63Updated last year
- PickleC2 is a post-exploitation and lateral movements framework☆83Updated 3 years ago
- Windows Privilege Escalation☆41Updated 2 years ago
- ☆28Updated this week
- Router socks. One port socks for all the others.☆66Updated 3 months ago
- An easy tool to disable and enable windows defender protections☆109Updated 2 years ago
- CVE-2022-31245: RCE and domain admin privilege escalation for Mailcow☆13Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆102Updated last year
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆23Updated 2 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆31Updated 3 years ago
- SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.☆50Updated 2 years ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆62Updated last year
- Docker setup for Pupy☆26Updated last year
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆44Updated 3 years ago
- Windows 权限提升 BadPotato☆12Updated 3 years ago
- ☆17Updated 3 years ago
- Postfix SMTP Smuggling - Expect Script POC☆25Updated 8 months ago
- CVE-2021-27928 MariaDB/MySQL-'wsrep provider' 命令注入漏洞☆58Updated last year
- ☆24Updated 2 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆58Updated last year
- Neton is a tool for getting information from Internet connected sandboxes☆92Updated last year
- ☆50Updated 3 weeks ago
- ☆21Updated this week
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients (CVE-2023-51385)☆46Updated 11 months ago
- This program will take encrypted shell code and decrypt it in run time and inject it into another process☆29Updated 2 years ago
- Simple tool to decrypt Jenkins encrypted strings☆68Updated last year