| ihebski/DefaultCreds-cheat-sheet |
5,023 |
|
0 |
0 |
about 2 years ago |
2 |
November 28, 2023 |
0 |
mit |
Python |
| One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️ |
| S3cur3Th1sSh1t/WinPwn |
3,073 |
|
0 |
0 |
over 2 years ago |
0 |
|
2 |
bsd-3-clause |
PowerShell |
| Automation for internal Windows Penetrationtest / AD-Security |
| giMini/PowerMemory |
726 |
|
0 |
0 |
about 6 years ago |
0 |
|
4 |
other |
PowerShell |
| Exploit the credentials present in files and memory |
| rek7/mXtract |
573 |
|
0 |
0 |
over 4 years ago |
0 |
|
1 |
mit |
C++ |
| mXtract - Memory Extractor & Analyzer |
| blacknbunny/CVE-2018-10933 |
494 |
|
0 |
0 |
over 2 years ago |
0 |
|
1 |
|
Python |
| Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH) |
| ezelf/CVE-2018-9995_dvr_credentials |
419 |
|
0 |
0 |
about 7 years ago |
0 |
|
4 |
gpl-3.0 |
Python |
| (CVE-2018-9995) Get DVR Credentials |
| sevagas/swap_digger |
376 |
|
0 |
0 |
almost 5 years ago |
0 |
|
1 |
gpl-3.0 |
Shell |
| swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc. |
| spicesouls/reosploit |
39 |
|
0 |
0 |
over 4 years ago |
0 |
|
0 |
mit |
Python |
| A Tool that Finds, Enumerates, and Exploits Reolink Cameras. |
| 649/Netscraped-Exploit |
23 |
|
0 |
0 |
about 6 years ago |
0 |
|
2 |
|
Python |
| Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for research only. |
| 7Elements/Fortigate |
23 |
|
0 |
0 |
about 4 years ago |
0 |
|
0 |
gpl-3.0 |
Python |
| Extract Useful info from SSL VPN Directory Traversal Vulnerability (FG-IR-18-384) |