Tool to mount all readable CIFS shares of a remote system locally to a linux system. This allows the use tools like filesystem GUIs, tree, and grep to parse and examine the remote shares as if they were locally stored.
☆16Jul 12, 2023Updated 2 years ago
Alternatives and similar repositories for mount_shares
Users that are interested in mount_shares are comparing it to the libraries listed below
Sorting:
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 3 years ago
- bowing to the AI Overlords.☆31Dec 18, 2024Updated last year
- ☆19Aug 26, 2020Updated 5 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- Report and finding templates used by the Serpico reporting tool☆16Sep 26, 2018Updated 7 years ago
- Tool to automate corporate network segmentation test☆21Aug 6, 2020Updated 5 years ago
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆52Sep 13, 2025Updated 5 months ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆49May 21, 2025Updated 9 months ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Sep 30, 2020Updated 5 years ago
- Python toolbox for hacking and problem solving☆22Sep 5, 2016Updated 9 years ago
- The most average C2 ever (MACE)☆97Apr 9, 2022Updated 3 years ago
- Workshop & Talk Slide Decks from HackSpaceCon☆26Dec 14, 2025Updated 2 months ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- ☆10Feb 27, 2026Updated last week
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- Collection of somewhat useful stuff for CTF events☆36Jun 24, 2015Updated 10 years ago
- ☆10Mar 2, 2026Updated last week
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Jun 17, 2024Updated last year
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- ☆12Oct 1, 2024Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- ☆15Sep 4, 2024Updated last year
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- Claude MCP server to perform analysis on ROADrecon data☆48Mar 30, 2025Updated 11 months ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Mar 20, 2017Updated 8 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆43Nov 16, 2022Updated 3 years ago
- The Cloud Blocker☆108Feb 16, 2025Updated last year
- Colour Me Cards are your classic holiday cards, with a modern twist.☆15Dec 24, 2018Updated 7 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- An exploit for CVE-2018-5955 GitStack 2.3.10 Unauthenticated RCE☆10Nov 15, 2024Updated last year
- ☆13Oct 30, 2022Updated 3 years ago
- A python exploit to automatically dump all the data stored by the auto-completion plugin of Ametys CMS to a local sqlite database file.☆14May 3, 2022Updated 3 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- EVM in python from scratch because why not☆11Aug 22, 2022Updated 3 years ago
- My dotfiles.☆11Apr 1, 2023Updated 2 years ago
- Tool to query the RIPE database☆11Jun 2, 2025Updated 9 months ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago