Tool to mount all readable CIFS shares of a remote system locally to a linux system. This allows the use tools like filesystem GUIs, tree, and grep to parse and examine the remote shares as if they were locally stored.
☆16Jul 12, 2023Updated 2 years ago
Alternatives and similar repositories for mount_shares
Users that are interested in mount_shares are comparing it to the libraries listed below
Sorting:
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 3 years ago
- bowing to the AI Overlords.☆31Dec 18, 2024Updated last year
- ☆19Aug 26, 2020Updated 5 years ago
- Tool to automate corporate network segmentation test☆21Aug 6, 2020Updated 5 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆52Sep 13, 2025Updated 5 months ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆49May 21, 2025Updated 9 months ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Sep 30, 2020Updated 5 years ago
- Python toolbox for hacking and problem solving☆22Sep 5, 2016Updated 9 years ago
- The most average C2 ever (MACE)☆97Apr 9, 2022Updated 3 years ago
- Workshop & Talk Slide Decks from HackSpaceCon☆26Dec 14, 2025Updated 2 months ago
- A wrapper around jq, to help you parse jq output!☆30Aug 23, 2020Updated 5 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- ☆10Feb 27, 2026Updated last week
- ☆10Updated this week
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Jun 17, 2024Updated last year
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- ☆12Oct 1, 2024Updated last year
- ☆11Dec 5, 2020Updated 5 years ago
- ☆15Sep 4, 2024Updated last year
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Mar 20, 2017Updated 8 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆43Nov 16, 2022Updated 3 years ago
- The Cloud Blocker☆108Feb 16, 2025Updated last year
- Scripts (python3 and Swift) for macOS to recursively check /Applications and also check /usr/local/bin, /usr/bin, and /usr/sbin for binar…☆98Sep 14, 2022Updated 3 years ago
- ☆12Dec 3, 2022Updated 3 years ago
- ☆10May 17, 2024Updated last year
- Work in progress to create an RFC that documents the OpenVPN protocol☆14Nov 24, 2025Updated 3 months ago
- ☆11Nov 29, 2025Updated 3 months ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Gradio chat interface for FastMLX☆12Sep 22, 2024Updated last year
- Lab Mouse Security research pertaining to RISC-V☆11May 13, 2017Updated 8 years ago
- ☆10May 29, 2023Updated 2 years ago
- A few Clio examples☆14Oct 11, 2021Updated 4 years ago