tomride / exploit-database-papersLinks
exploit-database-papers
☆13Updated 8 years ago
Alternatives and similar repositories for exploit-database-papers
Users that are interested in exploit-database-papers are comparing it to the libraries listed below
Sorting:
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32Updated 7 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Updated 7 years ago
- Scripts for OSCE☆18Updated 7 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- only for 31337☆24Updated 9 years ago
- ☆15Updated 3 years ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Updated 4 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Updated 7 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37Updated 10 years ago
- python tools to assist in penetration testing☆14Updated 2 weeks ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Updated 7 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆36Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Updated 7 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Updated 7 years ago
- My notes, exercises, and reports on reverse engineering and penetrating applications☆17Updated 7 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Updated 3 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Updated 8 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆69Updated 3 weeks ago
- Common Wordlists☆55Updated 9 years ago
- Interactive Post Exploitation Tool☆37Updated 6 years ago
- Shodanwave - Netwave IP Camera☆18Updated 8 years ago
- Code to check AWS S3 buckets☆17Updated 8 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆77Updated 6 years ago
- SMBMap is a handy SMB enumeration tool☆38Updated last year
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 6 years ago
- Notes on Active Directory analysis and exploitation☆11Updated 6 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago