wez3 / msfenumLinks
A Metasploit auto auxiliary script
☆103Updated 3 years ago
Alternatives and similar repositories for msfenum
Users that are interested in msfenum are comparing it to the libraries listed below
Sorting:
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- ☆98Updated 6 years ago
- ☆58Updated 5 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 3 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- Common password pattern generator using strings list☆131Updated 5 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆94Updated 7 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated 2 years ago
- SMB Relay Attack Script☆146Updated 7 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆97Updated 9 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67Updated 3 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Updated 2 years ago
- Brute forcer and shell deployer for WildFly☆101Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 7 years ago
- Scan for and exploit Consul agents☆39Updated 6 years ago
- Some scripts and exploits☆147Updated 7 years ago
- ☆122Updated 7 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 6 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- unix wildcard attacks☆137Updated 7 years ago
- Pypykatz server☆125Updated 6 years ago
- For all your network pentesting needs☆154Updated last year
- A web application for generating custom XSS payloads☆77Updated 6 years ago
- A Report Generation Tool for Security Assessment☆65Updated 7 years ago
- Responsive Command and Control System☆102Updated 3 years ago