Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for hosts exploitation
exploitation
x
hosts
x
1 search results found
Ladongo
⭐
1,423
Ladon for Kali 全平台开源内网渗透扫描器,Windows/Linux/Mac/路由器内网渗透,使用它可轻松一键批量探
Deepce
⭐
1,040
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Clusterd
⭐
609
application server attack toolkit
Sonar.js
⭐
502
A framework for identifying and launching exploits against internal network hosts. Works via WebRTC IP enumeration combined with WebSockets and external resource fingerprinting.
Ilo4_toolbox
⭐
399
Toolbox for HPE iLO4 & iLO5 analysis
Redsails
⭐
278
RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: https://www.youtube.com/watch?v=Ul8uPvlOsug
Go Shodan
⭐
167
Shodan API client
Htbenum
⭐
111
A Linux enumeration script for Hack The Box
Lxd_root
⭐
64
Linux privilege escalation via LXD
Goms17 010
⭐
56
Simple program for detecting if host(s) are vulnerable to SMB exploit(MS17-010)
Lem
⭐
46
Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits
Argo
⭐
39
Multi camera gathering and exploiting tool
Constole
⭐
35
Scan for and exploit Consul agents
Kube Pod Escape
⭐
33
Kubernetes POC for utilizing write mount to /var/log for getting a root on the host
Redismassexploit
⭐
30
Some handy scripts to collect hosts installed redis (using Shodan search engine) and exploit them
Win Exp
⭐
29
windwos辅助提权脚本
Vmware_guest_auth_bypass
⭐
28
Proof of concept of VMSA-2017-0012
Crax Lab
⭐
27
AIS3 CRAX lab demo
Elem
⭐
26
Enterprise Linux Exploit Mapper
Hikxploit
⭐
20
Cve 2019 5736
⭐
14
runc容器逃逸漏洞预警
Geppetto
⭐
12
Geppetto - Virtual machine and infrastructure orchestration
Moovmismanage
⭐
12
Moovbox Mismanagement Utilities
Vulmap Linux
⭐
11
Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilities with available exploits. All found exploits can be downloaded by Vulmap.
Intersect 2.0
⭐
10
Linux Post-Exploitation Automation
Iot Mqtt Exploit
⭐
9
An tool for search IOT MQTT vulnerable with shodan
Install Dsilink
⭐
7
Kata
⭐
6
A collection of breach and post-exploitation kata for the red teamer to constantly train to maintain proficiency.
Empire
⭐
6
:godmode: Empire (https://github.com/EmpireProject/Empire) dockerized
Ps4 Exploit Host Installer
⭐
5
A Ubuntu Installer for Al Azifs PS4 Exploit Host
Pentest In Docker
⭐
5
Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)
Cctv Remote Code Execution Metasploit Module
⭐
5
CCTV Remote Code Execution Metasploit Module
Related Searches
Python Hosts (2,923)
Shell Hosts (2,872)
Docker Hosts (2,545)
Javascript Hosts (1,993)
Python Exploitation (1,616)
Ansible Hosts (1,357)
Hosts Ssh (1,120)
Golang Hosts (1,098)
Port Hosts (1,039)
Php Hosts (926)
1-1 of 1 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.