Skip to content
#

pentest

Here are 436 public repositories matching this topic...

大型内网渗透扫描器&Cobalt Strike,包含信息收集/端口扫描/服务识别/网络资产/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010、Weblogic、ActiveMQ、Tomcat等,密码口令爆破含(Mysql、Oracle、MSSQL)、FTP、SSH(Linux)、VNC、Windows(IPC、WMI、SMB)等,可高度自定义插件支持.NET程序集、DLL(C#/Delphi/VC)、PowerShell等语言编写的插件,支持通过配置INI批量调用任意外部程序或命令,EXP生成器一键生成Web漏洞POC,可快速扩展扫描或利用能力。支持Cobalt Strike插件化直接内存加载Ladon扫描快速拓展内网横向移动

  • Updated Mar 9, 2020
  • C#
viyatb
viyatb commented May 5, 2018

The network scanner bundled (https://github.com/owtf/owtf/blob/develop/owtf/net/scanner.py) is not being used in any code path by OWTF right now. There is already a function defined to run plugins for a list of targets by pre-processing them through the network scanner, https://github.com/owtf/owtf/blob/develop/owtf/plugin/runner.py#L509 but it is not being used.

We should bring back the `proc

CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection

  • Updated Mar 5, 2020
  • Python
ELHARAKA
ELHARAKA commented Jan 29, 2020

I have been using this tool for awhile and i noticed 50% of the results are false positive. for i,e after cloudflair dump a list of ip addresses for the site origin server it can't detect which one is working so i after i take those ip addresses i test them manually on the both ports 443 & 80 some they work on 443 port and some they only work at 80 port.

Thank you so much for this amazing tool

Improve this page

Add a description, image, and links to the pentest topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the pentest topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.