DanaEpp / pwncat_pwnkit
pwncat module that automatically exploits CVE-2021-4034 (pwnkit)
☆32Updated 3 years ago
Alternatives and similar repositories for pwncat_pwnkit:
Users that are interested in pwncat_pwnkit are comparing it to the libraries listed below
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆34Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆10Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- self-hosted Azure OSINT tool☆27Updated 6 months ago
- ☆17Updated last year
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆27Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Updated 3 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆17Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- A tool to tunnel TCP traffic over WinRM☆17Updated 3 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- ☆26Updated 3 years ago
- Detect and remove the presence of canary tokens☆19Updated last year
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 11 months ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- FireProx written in Go☆19Updated 11 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- ☆52Updated last year