FourCoreLabs / spring4shell-exploit-poc
Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.
☆43Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for spring4shell-exploit-poc
- Red Teaming & Active Directory Cheat Sheet.☆39Updated last year
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 2 years ago
- ☆41Updated 2 years ago
- C2 Automation using Linode☆78Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆68Updated 2 years ago
- Enumerate AWS permissions and resources.☆63Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 3 years ago
- ☆27Updated last year
- Network penetration testing toolset wrapper☆80Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 2 years ago
- Simple AV Evasion for PE Files☆41Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆85Updated last year
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- This repo will contain some basic pentest/RT commands.☆36Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆60Updated last month
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆26Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆29Updated last year
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆47Updated 7 months ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆63Updated 10 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- ☆118Updated last year