whotwagner / logrottenLinks
☆165Updated 3 months ago
Alternatives and similar repositories for logrotten
Users that are interested in logrotten are comparing it to the libraries listed below
Sorting:
- Juicy Potato for x86 Windows☆122Updated 5 years ago
- ☆160Updated 3 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆129Updated 3 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆103Updated 6 years ago
- Extracts Key Values from .keytab files☆295Updated 4 years ago
- Aspx reverse shell☆112Updated 5 years ago
- MS17-010☆272Updated 2 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆318Updated last year
- Changes for Visual Studio 2013☆118Updated 10 years ago
- Root shell PoC for CVE-2021-3156☆69Updated 4 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆378Updated 12 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- ☆240Updated 10 years ago
- Squid Pivoting Open Port Scanner☆82Updated 8 months ago
- ☆219Updated 5 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆281Updated 2 years ago
- This script will bruteforce the credential of tomcat manager or host-manager☆22Updated 5 years ago
- Powershell script to extract information from boot PXE☆147Updated 6 years ago
- An script to perform kerberos bruteforcing by using impacket☆452Updated 3 years ago
- SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality.☆144Updated last year
- ☆147Updated last year
- Automating juicy potato local privilege escalation exploit for penetration testers☆144Updated 4 years ago
- Proof of Concept for CVE-2019-18634☆218Updated 3 years ago
- GitLab User Enumeration☆35Updated 7 months ago
- ☆120Updated 2 years ago
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆145Updated last year
- Powershell crazy and sometimes diabolic scripts☆157Updated 4 years ago
- Joomla login bruteforce☆75Updated last year
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆385Updated 4 years ago
- Kerberoast with ACL abuse capabilities☆527Updated 7 months ago