Aurum2008 / CVE2020-0796Links
Exploit for win10 SMB3.1
☆17Updated 5 years ago
Alternatives and similar repositories for CVE2020-0796
Users that are interested in CVE2020-0796 are comparing it to the libraries listed below
Sorting:
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- parsers to make life easier☆13Updated 4 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Apfell implant written in C#.☆8Updated 4 years ago
- Automated Payload Test Controller☆10Updated 7 years ago
- ☆17Updated 5 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- SSDP Service Discovery☆17Updated 6 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Brute Force and Scan WinRm Service☆13Updated 5 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆20Updated 3 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Forked and updated with some additional features over the original☆17Updated 4 years ago
- ☆20Updated 4 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- Random code snippets☆10Updated last year
- Manticore's Public Threats Repository☆10Updated 4 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago
- ☆17Updated 6 years ago
- ☆11Updated 4 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- ☆18Updated last year
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago