tomride / exploit-database-papers
exploit-database-papers
☆13Updated 7 years ago
Alternatives and similar repositories for exploit-database-papers
Users that are interested in exploit-database-papers are comparing it to the libraries listed below
Sorting:
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆17Updated 8 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- ☆23Updated 4 years ago
- Notes on Active Directory analysis and exploitation☆11Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 8 years ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- My notes, exercises, and reports on reverse engineering and penetrating applications☆17Updated 6 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆19Updated 4 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Updated 7 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 7 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- all published scripts devloped by ahmed khlief☆20Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 8 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- ☆20Updated 5 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆32Updated 8 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆19Updated 8 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago