Diefunction / ZabbixAPIAbuseLinks
Abuse Zabbix API to obtain Remote Command Execution on hosts
☆18Updated 4 years ago
Alternatives and similar repositories for ZabbixAPIAbuse
Users that are interested in ZabbixAPIAbuse are comparing it to the libraries listed below
Sorting:
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆99Updated last year
- ☆88Updated 3 years ago
- Some scripts to support with importing large datasets into BloodHound☆81Updated 2 years ago
- WNF Code Execution Library Using C#☆111Updated 5 years ago
- ☆112Updated 2 years ago
- ☆74Updated 6 months ago
- Get Fine Grained Password Policy☆78Updated 8 months ago
- Serverless Redirector in various cloud vendor for red team☆73Updated 3 years ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆70Updated 5 years ago
- A module for CME that spiders across a domain.☆35Updated 3 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆129Updated 2 years ago
- ☆120Updated 8 months ago
- ☆32Updated 2 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Updated 3 years ago
- Random☆34Updated 3 years ago
- Buggy script to play with GPOs☆120Updated 11 months ago
- Smart Card PIN swiping DLL☆78Updated 5 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆122Updated 3 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆130Updated 4 years ago
- Simple APPLocker bypass summary☆47Updated 7 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆102Updated 3 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆117Updated 2 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆93Updated 2 years ago
- ☆93Updated 4 years ago
- ☆79Updated 10 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆58Updated 3 years ago
- ☆21Updated 4 years ago