wez3 / msfenum
A Metasploit auto auxiliary script
☆103Updated 2 years ago
Alternatives and similar repositories for msfenum:
Users that are interested in msfenum are comparing it to the libraries listed below
- WhiteBox CMS analysis☆69Updated last year
- For all your network pentesting needs☆153Updated 9 months ago
- Some scripts and exploits☆146Updated 6 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- Pypykatz server☆125Updated 6 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 6 years ago
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆125Updated 6 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- ☆98Updated 6 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Updated 5 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- ☆122Updated 7 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 9 years ago
- ☆59Updated 4 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 6 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- Exploits and advisories☆189Updated 4 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Samba, NFS shares spider and grepper☆71Updated 6 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆183Updated 5 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 2 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- Phishing Template Generation Made Easy☆164Updated 7 years ago
- unix wildcard attacks☆132Updated 6 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago