An00bRektn / CVE-2021-4034
A Golang implementation of clubby789's implementation of CVE-2021-4034
☆11Updated 3 years ago
Alternatives and similar repositories for CVE-2021-4034
Users that are interested in CVE-2021-4034 are comparing it to the libraries listed below
Sorting:
- Re-implementation of VirtueSecurity's benigncertain-monitor☆11Updated 4 years ago
- pwncat windows c2 components☆19Updated 3 years ago
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Updated 3 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 4 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- ☆17Updated 4 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- CVE-2020-0688 PoC☆11Updated 5 months ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 2 months ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 4 years ago
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 5 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- ☆12Updated last year
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 4 years ago
- Windows 权限提升 BadPotato☆13Updated 3 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆21Updated last year
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- Strategy for building a Red Team☆17Updated last year
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 2 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Updated 4 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago