resurrecting-open-source-projects / nbtscanLinks
Scan networks searching for NetBIOS information
☆46Updated 3 years ago
Alternatives and similar repositories for nbtscan
Users that are interested in nbtscan are comparing it to the libraries listed below
Sorting:
- Windows offline filesystem hacking tool for Linux☆96Updated 3 years ago
- Windows Oracle Database Attack Toolkit☆80Updated 3 years ago
- PowerBruteLogon (Ported version of WinBruteLogon in pure PowerShell)☆123Updated 2 years ago
- Router socks. One port socks for all the others.☆69Updated last year
- ☆26Updated 3 years ago
- ☆56Updated 9 months ago
- The largest collection of wordlists in yaml for bug bounty tools☆37Updated last year
- reverse socks tunneler with ntlm and proxy support☆60Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 4 years ago
- Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)☆24Updated 4 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- ☆10Updated 8 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆34Updated last year
- Windows Privilege Escalation☆70Updated 3 years ago
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Updated 3 years ago
- A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)☆23Updated 3 years ago
- CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.☆39Updated 3 years ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆73Updated 2 years ago
- Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler / Citrix ADC to CVE-2023-3519☆85Updated 2 years ago
- Web shell generator and command line interface.☆85Updated 5 years ago
- It's easy as cake to dump your secrets☆49Updated 2 years ago
- Repository of CVE found by OCD people☆83Updated 7 months ago
- Zimbra CVE-2022-37042 Nuclei weaponized template☆21Updated 3 years ago
- A standalone WMI protocol for CrackMapExec☆51Updated 6 years ago
- Escaping Restricted Environments and Bypassing DLP☆77Updated 7 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Updated 3 years ago
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆56Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients (CVE-2023-51385)☆51Updated 2 years ago
- An evil bit backdoor for iptables☆55Updated 4 years ago