BlackMathIT / Esteemaudit-MetasploitLinks
Porting for Metasploit of the infamous Esteemaudit RDP Exploit
☆111Updated 7 years ago
Alternatives and similar repositories for Esteemaudit-Metasploit
Users that are interested in Esteemaudit-Metasploit are comparing it to the libraries listed below
Sorting:
- Domain user enumeration tool☆215Updated last year
- Exploits and advisories☆190Updated 5 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆304Updated 2 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆263Updated 7 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- Windows Pentest Scripts☆231Updated 7 years ago
- How To Execute Shellcode via HTA☆139Updated 7 years ago
- ☆169Updated 7 years ago
- Penetration testing scripts☆143Updated 7 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆122Updated 6 years ago
- initial commit☆174Updated 6 years ago
- PowerDNS: Powershell DNS Delivery☆212Updated 6 years ago
- ☆295Updated 4 years ago
- Search Exploitable Software on Linux☆228Updated 2 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆244Updated 8 years ago
- Collection of scripts, binaries and the like to aid in WhiteList Evasion on a Microsoft Windows Network.☆128Updated 10 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆125Updated 5 years ago
- ☆206Updated 4 years ago
- rce exploit , made to work with pocsuite3☆119Updated 5 years ago
- ntlm relay attack to Exchange Web Services☆333Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆237Updated 2 years ago
- Collection of Windows Hacking Binaries☆50Updated 9 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆210Updated 7 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆99Updated 7 years ago
- Enyx SNMP IPv6 Enumeration Tool☆102Updated 2 years ago
- Port of eternal blue exploits to powershell☆150Updated 8 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆204Updated 6 years ago