securing / mirai_credentials
Mirai botnet credentials compiled for hydra
☆18Updated 7 years ago
Related projects: ⓘ
- Miscellaneous exploit scripts☆17Updated 2 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆21Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- ARP Man-in-the-Middle tool☆27Updated 4 years ago
- Standardizing Security Titles☆13Updated last year
- Simplified NAT Slipstream server and client☆20Updated 3 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆18Updated last year
- PoC code for crashing windows active directory☆34Updated 6 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 7 years ago
- ☆15Updated this week
- Web application that lets you test if your domain is vulnerable to email spoofing☆32Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆15Updated 10 years ago
- Search Nmap and Metasploit scanning scripts.☆53Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- ☆10Updated this week
- module for certexfil☆15Updated 2 years ago
- ☆32Updated this week
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Updated 5 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 4 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆17Updated 3 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆35Updated 6 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 6 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆16Updated 4 years ago
- A tool for recover router password☆29Updated 6 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago