sempervictus / xssf
cross site scripting framework plugin for metasploit
☆17Updated 12 years ago
Alternatives and similar repositories for xssf:
Users that are interested in xssf are comparing it to the libraries listed below
- ☆20Updated last year
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Projects and POCs☆60Updated 10 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Updated 11 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Dependencies for Veil 3☆18Updated 8 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- ☆47Updated 9 years ago
- Simple socket-based gateway to the Burp Collaborator☆33Updated 8 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆38Updated 7 years ago
- A curated list of rootkits found on Github and other sites.☆62Updated 7 years ago
- ☆34Updated 8 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆31Updated 11 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 12 years ago
- ☆21Updated 8 years ago
- ~ BannerGrab☆26Updated 8 years ago
- LFI scan, exploit tool☆13Updated 10 years ago
- Juniper backdoor☆13Updated 9 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- A BurpSuite extension for lair☆28Updated 7 years ago
- BurpSuite extension to assist with Automated Forced Browsing/Endpoint Enumeration☆23Updated 6 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 7 years ago
- Miscellaneous projects related to attacking Windows.☆28Updated 5 years ago
- EmPyre Web Interface☆12Updated 8 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 8 years ago