Edd13Mora / Hadoken
Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.
☆49Updated last year
Alternatives and similar repositories for Hadoken
Users that are interested in Hadoken are comparing it to the libraries listed below
Sorting:
- Dump Windows SAM hashes☆42Updated last year
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Updated 2 years ago
- ☆38Updated 3 weeks ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆44Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆38Updated 2 years ago
- CVE-2023-34960 Chamilo PoC☆35Updated last year
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆49Updated 11 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year
- backdoor exploit for vsftpd 2.3.4 on python☆15Updated last year
- Proof of Concept Exploit for CVE-2024-9464☆45Updated 7 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- List of some AD tools I frequently use☆45Updated 3 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- Proof-of-concept exploit for CVE-2024-25153.☆42Updated last year
- Exploits targeting vBulletin.☆76Updated 2 years ago
- CVE-2024-27956 WordPress Automatic < 3.92.1 - Unauthenticated SQL Injection☆18Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆60Updated 5 months ago
- ☆56Updated 6 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆70Updated 11 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Updated last year
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- Windows Privilege Escalation☆60Updated 2 years ago
- C++ Code to perform a MiniDump of lsass.exe☆34Updated last year
- Encoder PHP webshell to bypass WAF using XOR operations.☆53Updated last year
- Authentication Bypass in GoAnywhere MFT☆61Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆95Updated last year
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Updated 3 months ago