| quentinhardy/msdat |
754 |
|
0 |
0 |
over 2 years ago |
0 |
|
5 |
|
Python |
| MSDAT: Microsoft SQL Database Attacking Tool |
| lord-alfred/ipranges |
343 |
|
0 |
0 |
about 2 years ago |
0 |
|
2 |
cc0-1.0 |
Shell |
| 🔨 List all IP ranges from: Google (Cloud & GoogleBot), Bing (Bingbot), Amazon (AWS), Microsoft (Azure), Oracle (Cloud), GitHub, Facebook (Meta), OpenAI (GPTBot) and other with daily updates. |
| Plazmaz/LNKUp |
192 |
|
0 |
0 |
over 8 years ago |
0 |
|
0 |
|
Python |
| Generates malicious LNK file payloads for data exfiltration |
| d4t4s3c/SMBploit |
63 |
|
0 |
0 |
about 4 years ago |
0 |
|
1 |
gpl-3.0 |
Shell |
| Offensive tool to scan & exploit vulnerabilities in Microsoft Windows over the Samba protocol (SMB) using the Metasploit Framework. |
| righettod/pst-digger |
40 |
|
0 |
0 |
almost 7 years ago |
0 |
|
1 |
gpl-3.0 |
Java |
| Program to analyze mails stored into a Microsoft Outlook PST file and find one based on search keywords. |
| onSec-fr/CVE-2020-0688-Scanner |
35 |
|
0 |
0 |
almost 5 years ago |
0 |
|
0 |
mit |
C# |
| Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method. |
| mattrotlevi/lava |
30 |
|
0 |
0 |
almost 5 years ago |
0 |
|
0 |
gpl-3.0 |
Python |
| Microsoft Azure Exploitation Framework |
| microsoft/MSRC-Microsoft-Engage-API |
19 |
|
0 |
0 |
almost 3 years ago |
0 |
|
0 |
mit |
Objective-C |
| MSRC Engage API |
| xFreed0m/SMBScanner |
13 |
|
0 |
0 |
about 3 years ago |
3 |
June 01, 2020 |
0 |
gpl-3.0 |
Go |
| Golang tool to scan hosts for SMB version and signing status |
| nickvourd/RTI-Toolkit |
12 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
mit |
PowerShell |
| Remote Template Injection Toolkit |