CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
☆31Mar 30, 2020Updated 5 years ago
Alternatives and similar repositories for CVE-2020-0796
Users that are interested in CVE-2020-0796 are comparing it to the libraries listed below
Sorting:
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆14Mar 24, 2023Updated 2 years ago
- Low Pin Count (LPC) Analyzer for Saleae Logic☆17Apr 18, 2024Updated last year
- Vuls Beater for Elasticsearch - connecting vuls☆17Dec 15, 2020Updated 5 years ago
- This project is a Python script that exploits the CVE-2023-24489 vulnerability in ShareFile. It allows remote command execution on the ta…☆13Jul 12, 2023Updated 2 years ago
- A powerful Burp extension to make bounty rain☆14Feb 1, 2022Updated 4 years ago
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Jul 21, 2021Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- ☆25Aug 11, 2020Updated 5 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Nov 19, 2020Updated 5 years ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- Simulating Adversary Operations☆98Apr 13, 2018Updated 7 years ago
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆22Oct 18, 2024Updated last year
- ☆19Jul 23, 2021Updated 4 years ago
- CISCO CVE-2020-3452 Scanner & Exploiter☆99Jul 29, 2021Updated 4 years ago
- .NET project for installing Persistence☆63Feb 14, 2022Updated 4 years ago
- Awesome Penetration Testing A collection of awesome penetration testing resources☆64Jan 26, 2018Updated 8 years ago
- ☆27Jul 29, 2024Updated last year
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Jul 7, 2021Updated 4 years ago
- DLInjector for Graphical User Interface.☆35Jan 28, 2021Updated 5 years ago
- Cobaltstrike Aggressor Scripts☆28May 1, 2017Updated 8 years ago
- Windows 10 Live Information viewer☆38Jan 27, 2022Updated 4 years ago
- Supertruder but better☆31Mar 10, 2023Updated 2 years ago
- Demos and presentation from SECArmy Village Grayhat 2020☆37Mar 15, 2023Updated 2 years ago
- A Binary Ninja plugin for importing IDC database dumps from IDA.☆40Oct 13, 2022Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- ☆35Aug 20, 2019Updated 6 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91May 10, 2020Updated 5 years ago
- SPI MITM for the Arty S7-50☆14Dec 24, 2022Updated 3 years ago
- A prototype to explore different file recovery techniques for the UFS2 filesystem. Specifically for use with PS3/4.☆13Jul 24, 2022Updated 3 years ago
- ☆12Dec 22, 2025Updated 2 months ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- A tool to detect who's cutting the internet on your network☆13Apr 30, 2020Updated 5 years ago
- aarch64 Malware course☆11Nov 13, 2025Updated 3 months ago