🖖Vulnerability Analysis
yersinia -Goscanner -s 192.168.1.15 -P 1040tritydoona -m HTTP -t 192.168.1.15 -M 5lynis -hCATcge.plcisco-ocs
cisco-ocs 192.168.99.200 192.168.99.202cisco-ocrcisco-torch -A 10.1.1.0/24copy-router-config.plmerge-router-config.plbed -s HTTP -t 192.168.1.15ohrwurmsfuzz -hspike-generic_chunked
spike-generic_listen_tcp
spike-generic_send_tcp
spike-generic_send_udpdhcpigiaxflood 192.168.1.202 192.168.1.1 500inviteflood eth0 5000 example.local 192.168.1.5 100siege example.comt50 -h
t50 --flood 192.168.1.1
thc-ssl-dos -l 100 192.168.1.208 443 --acceptace -i eth0 -m 00:1E:F7:28:9C:8e
ace -r eth0.96enumiax -d /usr/share/wordlists/metasploit/unix_users.txt 192.168.1.1protos-sip -hrtpbreak -i eth0 -g -m -d rtplogrtpflood -hrtpinsertsound -hrtpmixsound -hsctpscan -s -F -r 192.168.1.*sippsvcrack -h
svreport -h
svmap -h
svwar -hvoiphopper -i eth0 -zunix-privesc-check standardLast updated
Was this helpful?


