tomride / exploit-database-papersLinks
exploit-database-papers
☆13Updated 8 years ago
Alternatives and similar repositories for exploit-database-papers
Users that are interested in exploit-database-papers are comparing it to the libraries listed below
Sorting:
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Updated 6 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- ☆15Updated 3 years ago
- Interactive Post Exploitation Tool☆37Updated 6 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37Updated 10 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆36Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Updated 7 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Updated 7 years ago
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆32Updated 4 years ago
- Scripts for OSCE☆18Updated 7 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Updated 3 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆67Updated 6 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 9 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 8 years ago
- Methods of C2☆22Updated 10 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Updated 7 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆75Updated last month
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- Shodanwave - Netwave IP Camera☆18Updated 8 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Updated 10 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆69Updated 3 weeks ago
- only for 31337☆24Updated 9 years ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- One line PS scripts that may come handy during your network assesment☆79Updated 5 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 6 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated 2 years ago