tomride / exploit-database-papers
exploit-database-papers
☆13Updated 7 years ago
Alternatives and similar repositories for exploit-database-papers:
Users that are interested in exploit-database-papers are comparing it to the libraries listed below
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- SWF Vulnerability & Information Scanner☆20Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- ☆15Updated 2 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆17Updated 8 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Advisories and Proofs of Concept by BlackArrow☆17Updated 3 months ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 4 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- only for 31337☆22Updated 8 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago