OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).
☆156Nov 15, 2019Updated 6 years ago
Alternatives and similar repositories for massh-enum
Users that are interested in massh-enum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Open source tool to help you build a valid SSL certificate chain.☆377Nov 19, 2024Updated last year
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,821Nov 19, 2024Updated last year
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆508Nov 19, 2024Updated last year
- Browse and search through nmap's NSE scripts.☆59Jun 8, 2017Updated 8 years ago
- ☆16Sep 6, 2017Updated 8 years ago
- Some scripts and exploits☆148Jul 9, 2018Updated 7 years ago
- Collection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.☆536Dec 1, 2019Updated 6 years ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Advanced web server fingerprinting for Nmap☆129Sep 29, 2017Updated 8 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆528Jun 26, 2021Updated 4 years ago
- Drupal enumeration & exploitation tool☆610Nov 4, 2020Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Mar 7, 2018Updated 8 years ago
- First IDE for Nmap Script (NSE) Development.☆359Aug 8, 2020Updated 5 years ago
- Script to steal passwords from ssh.☆489Dec 19, 2018Updated 7 years ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,297Dec 23, 2018Updated 7 years ago
- JShell - Get a JavaScript shell with XSS.☆533May 5, 2019Updated 6 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- MSDAT: Microsoft SQL Database Attacking Tool☆989Aug 1, 2023Updated 2 years ago
- Collection of scripts created while taking the SecurityTube Python Scripting Expert course☆56Apr 12, 2020Updated 5 years ago
- Test and exploit for CVE-2017-12542☆91Apr 15, 2018Updated 7 years ago
- The best way to scan for weak ssh passwords on your network☆620Dec 18, 2023Updated 2 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Apr 23, 2017Updated 8 years ago
- PoC for CVE-2020-8617 (BIND)☆45May 20, 2020Updated 5 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆36Nov 15, 2024Updated last year
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆260Mar 9, 2021Updated 5 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- Exploit written in Python for CVE-2018-15473 with threading and export formats☆532Jul 12, 2024Updated last year
- A code demonstrating CVE-2018-0886☆269Aug 14, 2020Updated 5 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- Notes as I learn basic AWS penetration testing☆67May 28, 2019Updated 6 years ago