wez3 / msfenumLinks
A Metasploit auto auxiliary script
☆103Updated 3 years ago
Alternatives and similar repositories for msfenum
Users that are interested in msfenum are comparing it to the libraries listed below
Sorting:
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- SMB Relay Attack Script☆148Updated 6 years ago
- ☆58Updated 5 years ago
- ☆98Updated 6 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- Common password pattern generator using strings list☆131Updated 5 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 2 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- unix wildcard attacks☆136Updated 7 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- For all your network pentesting needs☆154Updated last year
- Some scripts and exploits☆148Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆123Updated 2 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 7 years ago
- A Report Generation Tool for Security Assessment☆65Updated 6 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆97Updated 8 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago
- Custom tools and projects about security☆110Updated 4 months ago
- ☆122Updated 7 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 6 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Updated 5 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Updated 2 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆153Updated 7 years ago
- Deploy payloads to *Nix systems en masse☆109Updated 5 years ago