sjhilt / Nmap-NSEs
☆35Updated last month
Alternatives and similar repositories for Nmap-NSEs:
Users that are interested in Nmap-NSEs are comparing it to the libraries listed below
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- PHDAYS |||☆17Updated 11 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 7 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 12 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Updated 7 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- BlackHat Europe 2017 Slides☆26Updated 6 years ago
- Hacking challenges☆32Updated 7 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 4 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- Projects and POCs☆59Updated 10 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 5 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Simple DDE object detector☆55Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- CVE-2016-1287 vulnerability test☆16Updated 8 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- collection of useful shells for penetration tests☆36Updated 7 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago