wesng v1.03 releases: Windows Exploit Suggester
Windows Exploit Suggester – Next Generation (WES-NG) WES-NG is a tool based on the output of Windows’ systeminfo utility that provides you with the list of vulnerabilities the OS is vulnerable...
Post Exploitation / Vulnerability Analysis
by do son · Published April 30, 2019 · Last modified June 26, 2022
Windows Exploit Suggester – Next Generation (WES-NG) WES-NG is a tool based on the output of Windows’ systeminfo utility that provides you with the list of vulnerabilities the OS is vulnerable...
DCOMrade DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement, code execution, data exfiltration, etc. The script is...
Vulnerability Analysis / Web Vulnerability Analysis
by do son · Published April 12, 2019 · Last modified April 11, 2023
Archery is an opensource vulnerability assessment and management tool which helps developers and pentesters to perform scans and manage vulnerabilities. Archery uses popular opensource tools to perform comprehensive scanning for...
Vulnerability Analysis / Web Vulnerability Analysis
by do son · Published March 22, 2019 · Last modified November 4, 2024
getsploit Command line search and download tool for Vulners Database inspired by searchsploit. It allows you to search online for the exploits across all the most popular collections: Exploit-DB, Metasploit, Packetstorm, and others. The most powerful...
Information Gathering / Vulnerability Analysis / Web Information Gathering / Web Vulnerability Analysis
by do son · Published March 18, 2019 · Last modified October 25, 2022
Offensive ELK: Elasticsearch for Offensive Security Traditional “defensive” tools can be effectively used for Offensive security data analysis, helping your team collaborate and triage scan results. In particular, Elasticsearch offers...
JNDIAT – JNDI Attacking Tool JNDIAT (JNDI Attacking Tool) is an open source penetration testing tool that tests the security of Weblogic servers through the T3 protocol. Usage examples of JNDIAT: You want to search if...
Information Gathering / Vulnerability Analysis
by do son · Published March 14, 2019 · Last modified March 13, 2019
GoScan GoScan is an interactive network scanner client, featuring auto-complete, which provides abstraction and automation over nmap. It can be used to perform host discovery, port scanning, and service enumeration in...
sheepl Sheepl: Creating realistic user behaviour for supporting tradecraft development within lab environments Introduction There are lots of resources available online relating to how you can build AD network environments...
Exploitation / Vulnerability Analysis
by do son · Published February 26, 2019 · Last modified November 4, 2024
msf-autoshell Give it a .nessus file and it’ll get you Metasploit shells. I’ve included the early and incomplete programs to make it easier for people who want to learn how...
Information Gathering / Network PenTest / Password Attacks / Vulnerability Analysis / Web Information Gathering / Web Vulnerability Analysis / WebApp PenTest
by do son · Published February 20, 2019 · Last modified November 4, 2024
SPARTA is a python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase. It allows the tester to save time...
Vulners-lookup A small script to perform vulnerabilities/exploits lookup on Vulners Database (https://vulners.com/). Vulners aggregates lots of various sources (including exploit-db, 0day.today, Nessus db, OpenVAS db…), see https://vulners.com/stats for a complete list. This...
MicroBurst: A PowerShell Toolkit for Attacking Azure MicroBurst includes functions and scripts that support Azure Services discovery, weak configuration auditing, and post exploitation actions such as credential dumping. It is...
bscan is a command-line utility to perform active information gathering and service enumeration. At its core, bscan asynchronously spawns processes of well-known scanning utilities, repurposing scan results into highlighted console output and a...
Nightcall Automated enumeration script built to reduce repetitive tasks during large network pentests. Initial host discovery performed by basic throttled masscan, followed by service enumeration of each host, full port...
SIET Smart Install Exploitation Tool Cisco Smart Install is a plug-and-play configuration and image-management feature that provides zero-touch deployment for new switches. You can ship a switch to a location,...