whotwagner / logrottenLinks
☆184Updated 8 months ago
Alternatives and similar repositories for logrotten
Users that are interested in logrotten are comparing it to the libraries listed below
Sorting:
- Juicy Potato for x86 Windows☆129Updated 6 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆141Updated 3 years ago
- ☆164Updated 3 years ago
- Extracts Key Values from .keytab files☆335Updated 5 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆119Updated 7 years ago
- MS17-010☆272Updated 3 years ago
- Aspx reverse shell☆118Updated 5 years ago
- ☆220Updated 5 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆349Updated last year
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆78Updated 4 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆419Updated 12 years ago
- Root shell PoC for CVE-2021-3156☆71Updated 4 years ago
- This script will bruteforce the credential of tomcat manager or host-manager☆27Updated 5 years ago
- Squid Pivoting Open Port Scanner☆93Updated last year
- Changes for Visual Studio 2013☆118Updated 10 years ago
- ☆275Updated 10 years ago
- Proof of Concept for CVE-2019-18634☆231Updated 4 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆284Updated 2 years ago
- An script to perform kerberos bruteforcing by using impacket☆456Updated 3 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆397Updated 4 years ago
- Powershell script to extract information from boot PXE☆153Updated 6 years ago
- ☆158Updated 3 months ago
- Joomla login bruteforce☆95Updated last year
- linikatz is a tool to attack AD on UNIX☆586Updated 2 years ago
- SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality.☆159Updated last year
- Kerberoast with ACL abuse capabilities☆593Updated last year
- ☆125Updated 3 years ago
- Herramienta para evadir disable_functions y open_basedir☆475Updated 2 years ago
- Windows Kernel Exploits☆69Updated 8 years ago
- ☆218Updated 5 years ago