Aurum2008 / CVE2020-0796Links
Exploit for win10 SMB3.1
☆17Updated 5 years ago
Alternatives and similar repositories for CVE2020-0796
Users that are interested in CVE2020-0796 are comparing it to the libraries listed below
Sorting:
- Useful Windows and AD tools☆15Updated 3 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Updated 4 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- ZAP plugin demonstrating custom view for WebSocket messages.☆13Updated 3 years ago
- Scripts for OSCE☆18Updated 6 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 4 years ago
- Brute Force and Scan WinRm Service☆13Updated 5 years ago
- Automated Payload Test Controller☆10Updated 8 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- ☆11Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆21Updated 3 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆14Updated 7 years ago