Stupid MQTT Brute Forcer
☆32Jul 27, 2017Updated 8 years ago
Alternatives and similar repositories for joffrey
Users that are interested in joffrey are comparing it to the libraries listed below
Sorting:
- ☆12Jan 12, 2023Updated 3 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- A script to automate Jenkins credential store decryption☆17May 29, 2018Updated 7 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- CentOS Control Web Panel, Root Privilege Escalation☆67Oct 25, 2019Updated 6 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- ☆25Mar 11, 2025Updated 11 months ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)☆22Feb 28, 2021Updated 5 years ago
- ☆85Dec 6, 2019Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- X41 BeanStack - Stack Trace Fingerprinting BETA☆52Dec 3, 2025Updated 3 months ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Jul 10, 2017Updated 8 years ago
- ownCloud exploits for CVE-2023-49105☆37Dec 5, 2023Updated 2 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Exploit code developed/reproduced by me☆90Jan 25, 2023Updated 3 years ago
- Passive-Recursive DNS daemon☆26Sep 20, 2024Updated last year
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- "Zero Click" Remote Code Execution in Mycroft AI vocal assistant☆56Jun 10, 2018Updated 7 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole☆27May 10, 2020Updated 5 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Symbol REPL☆31Mar 4, 2018Updated 8 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆124Mar 22, 2018Updated 7 years ago
- show which process did what DNS queries☆36Jan 25, 2018Updated 8 years ago
- PoC repository for CVE-2023-29007☆36Apr 26, 2023Updated 2 years ago
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago
- Shadowsocks-like proxy written in Go☆37Dec 18, 2019Updated 6 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 3 months ago
- ☆22Aug 31, 2016Updated 9 years ago