zedsec390 / NMAPLinks
NMAP scripts for TN3270 interaction as well as NJE. Most notably TSO User Enumeration and Brute Force. CICS transaction ID enumeration and NJE node name brute forcing.
☆26Updated 8 years ago
Alternatives and similar repositories for NMAP
Users that are interested in NMAP are comparing it to the libraries listed below
Sorting:
- Privilege escalation tools on Mainframe☆83Updated 6 years ago
- Mainframe security auditing and scripts☆142Updated 7 years ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆49Updated 2 years ago
- CICSpwn is a tool to pentest a CICS Transaction servers on z/OS.☆87Updated 4 years ago
- Mainframe Transfer: PROTOCOL☆28Updated 4 years ago
- z/OS Mainframe TSO Logon panel account enumerator and brute forcer☆30Updated 12 years ago
- CATSO/JCL wrapper for z/OS FTP logic attack☆26Updated 7 months ago
- PoC REXX Script to Help with z/OS System enumeration via OMVS/TSO/JCL.☆74Updated 3 months ago
- A collection of interesting REXX scripts to ease the life a mainframe pentester☆27Updated 8 years ago
- Big Iron Recon & Pwnage☆126Updated 3 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Updated 8 years ago
- Collection of materials related to IBM z/OS security☆44Updated 9 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Updated 9 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆57Updated 5 years ago
- TN3270 MitM proxy and so much more☆14Updated 7 years ago
- All the Power with no Shell☆35Updated 3 years ago
- Custom stagers with python encrypting proxy☆40Updated 10 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Powershell Persistence Locator☆66Updated 9 years ago
- Automated enumeration☆30Updated 4 years ago
- hack400tool☆106Updated 7 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Updated 7 years ago
- ☆41Updated 7 years ago
- Mainframe bruter and screen automation utility.☆43Updated 10 years ago
- PowerShell Empire docker build☆23Updated 9 years ago
- ☆19Updated 8 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Updated 8 years ago
- RACF and z/OS tools and info☆34Updated last month