This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB share.
☆22Feb 6, 2020Updated 6 years ago
Alternatives and similar repositories for BadSamba
Users that are interested in BadSamba are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python object interface to requests/responses recorded by Burp Suite☆37Jan 21, 2020Updated 6 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Self contained htaccess shells and attacks☆16May 18, 2018Updated 7 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Windows Privesc Check - PowerShell☆67Apr 22, 2022Updated 3 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- RoR / Devise PoC in memory Backdoor☆29Dec 14, 2014Updated 11 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- ☆55Jul 18, 2017Updated 8 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- Wordpress Plugins Scanner it's a semi-automatic white box pentesting/crawler app for WP plugins using RIPS from OWASP.☆14Aug 6, 2013Updated 12 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- SQLBrute is a tool for brute forcing data out of databases using blind SQL injection vulnerabilities.☆72Jan 21, 2020Updated 6 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- A simple framework for distributed task workflow using redis.☆32Jan 13, 2014Updated 12 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- Shellyzer Gui is a simple desktop application that helps you analyze shellcode (disassemble shellcode) in well view and i will add many f…☆12Jun 23, 2015Updated 10 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆107May 29, 2014Updated 11 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Oct 12, 2015Updated 10 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- This burpsuite extender provides a solution on testing Enterprise applications that involve security Authorization tokens into every HTTP…☆47Feb 27, 2019Updated 7 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Dec 9, 2015Updated 10 years ago