strozfriedberg / Windows-Exploit-SuggesterLinks
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
☆4,157Updated 2 years ago
Alternatives and similar repositories for Windows-Exploit-Suggester
Users that are interested in Windows-Exploit-Suggester are comparing it to the libraries listed below
Sorting:
- Windows Exploit Suggester - Next Generation☆4,715Updated this week
- Privilege Escalation Project - Windows / Linux / Mac☆2,593Updated last year
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,700Updated 3 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,904Updated 5 years ago
- Linux privilege escalation auditing tool☆6,318Updated last year
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,755Updated 3 years ago
- MS17-010☆2,217Updated 2 years ago
- SMBMap is a handy SMB enumeration tool☆1,987Updated last week
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,890Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,795Updated 5 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,805Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,617Updated last year
- Next-Generation Linux Kernel Exploit Suggester☆1,950Updated 2 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,507Updated 2 years ago
- JAWS - Just Another Windows (Enum) Script☆1,899Updated 4 years ago
- PowerTools is a collection of PowerShell projects with a focus on offensive operations.☆2,169Updated 3 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,749Updated 5 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,165Updated last week
- netshell features all in version 2 powershell☆2,322Updated last year
- A swiss army knife for pentesting networks☆8,999Updated 2 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,968Updated 7 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,753Updated 2 years ago
- Linux Exploit Suggester; based on operating system release number☆1,807Updated 11 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,167Updated last week
- Mimikatz implementation in pure Python☆3,191Updated last month
- A tool to perform Kerberos pre-auth bruteforcing☆3,155Updated last year
- PowerShell Obfuscator☆4,159Updated 2 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,948Updated this week
- Wiki to collect Red Team infrastructure hardening resources☆4,400Updated 2 months ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,395Updated 11 months ago