DanaEpp / pwncat_pwnkit
pwncat module that automatically exploits CVE-2021-4034 (pwnkit)
☆32Updated 3 years ago
Alternatives and similar repositories for pwncat_pwnkit:
Users that are interested in pwncat_pwnkit are comparing it to the libraries listed below
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆10Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Check robustness of your (their) Active Directory accounts passwords☆35Updated 2 months ago
- ☆18Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- self-hosted Azure OSINT tool☆30Updated 8 months ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Strategy for building a Red Team☆17Updated last year
- Continuous kerberoast monitor☆45Updated last year
- A user enumeration tool for Slack.☆28Updated 10 months ago
- This contains the contents needed to deploy a home lab in VirtualBox.☆18Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆25Updated 4 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆54Updated 6 months ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Updated 2 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- ☆27Updated this week
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated last week
- ☆12Updated 2 years ago