A simple script for discovery and analysis of UPnP servers
☆177Nov 29, 2022Updated 3 years ago
Alternatives and similar repositories for upnp_info
Users that are interested in upnp_info are comparing it to the libraries listed below
Sorting:
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- Customize Exploit Codes.☆18Dec 1, 2016Updated 9 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Automatically exported from code.google.com/p/miranda-upnp☆69Aug 4, 2017Updated 8 years ago
- A Upnp exploitation tool.☆106Oct 27, 2019Updated 6 years ago
- UPnP Pentest Toolkit for Windows☆261Nov 13, 2014Updated 11 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- ☆424Aug 29, 2017Updated 8 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Mar 22, 2017Updated 8 years ago
- Filet-O-Firewall Vulnerability PoC☆61Sep 4, 2015Updated 10 years ago
- Materials of Workshop presented at DEFCON 25☆107Jul 29, 2017Updated 8 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆100Aug 24, 2019Updated 6 years ago
- Teaching old shellcode new tricks☆209Aug 1, 2017Updated 8 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆33Jul 19, 2021Updated 4 years ago
- A code demonstrating CVE-2018-0886☆269Aug 14, 2020Updated 5 years ago
- Collection of metasploit modules☆69Mar 1, 2017Updated 9 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆243Sep 13, 2021Updated 4 years ago
- Stargate☆96Aug 6, 2016Updated 9 years ago
- Cable modem firmware dump☆41Jun 30, 2015Updated 10 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated last month
- Various PoCs☆502Jan 27, 2020Updated 6 years ago
- A Github organization reconnaissance tool.☆219May 22, 2023Updated 2 years ago
- UPnP hacking scripts and tools☆77Jan 14, 2017Updated 9 years ago
- Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049☆51Jul 22, 2017Updated 8 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆108Aug 13, 2018Updated 7 years ago
- Encrypted exploit delivery for the masses☆270Sep 25, 2019Updated 6 years ago
- Universal Plug and Fuzz☆41Sep 16, 2019Updated 6 years ago
- Platform Firmware Auditing Tool☆131Sep 7, 2018Updated 7 years ago
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Sep 21, 2017Updated 8 years ago
- Tool to make in memory man in the middle☆125Oct 8, 2018Updated 7 years ago
- Generates anti-sandbox analysis HTA files without payloads☆120Mar 16, 2017Updated 8 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago