resurrecting-open-source-projects / nbtscan
Scan networks searching for NetBIOS information
☆39Updated 2 years ago
Alternatives and similar repositories for nbtscan
Users that are interested in nbtscan are comparing it to the libraries listed below
Sorting:
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Updated 2 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- nuclei scanner for proxyshell ( CVE-2021-34473 )☆43Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆92Updated 3 years ago
- Fuel CMS 1.4 - Remote Code Execution☆7Updated 3 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated 5 months ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆30Updated 3 years ago
- SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.☆51Updated 3 years ago
- Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)☆23Updated 3 years ago
- A rogue DNS detector☆23Updated last year
- 🚪 Quick & dirty Wordpress Command Execution Shell☆66Updated 3 years ago
- Windows offline filesystem hacking tool for Linux☆96Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Nmap script to check vulnerability CVE-2021-21975☆28Updated 4 years ago
- netcat-like CLI tool with advanced features for bind/reverse shells☆16Updated last month
- Router socks. One port socks for all the others.☆68Updated 11 months ago
- Zimbra CVE-2022-37042 Nuclei weaponized template☆19Updated 2 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated last year
- Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215☆17Updated 2 years ago
- Network scanner☆41Updated last month
- A selection of rebuilt and from scratch exploits, scripts and ideas that can be used in red-teaming scenarios.☆6Updated last year
- ☆10Updated 7 years ago
- Postfix SMTP Smuggling - Expect Script POC☆25Updated last year
- List of fresh and validated DNS resolvers updated every 12h.☆22Updated 2 weeks ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆62Updated 4 months ago
- Given a list of domains, you resolve them and get the IP addresses.☆48Updated 3 years ago
- Cervantes plataform docker repository☆13Updated last month
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆44Updated last year
- ☆26Updated 2 years ago