JohnHammond / CVE-2021-34527Links
☆300Updated 4 years ago
Alternatives and similar repositories for CVE-2021-34527
Users that are interested in CVE-2021-34527 are comparing it to the libraries listed below
Sorting:
- ☆221Updated 5 years ago
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆402Updated last year
- Python version of the C# tool for "Shadow Credentials" attacks☆841Updated 4 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆309Updated 2 years ago
- An script to perform kerberos bruteforcing by using impacket☆455Updated 3 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆602Updated 5 months ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆383Updated last year
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆354Updated last year
- Windows Local Privilege Escalation from Service Account to System☆904Updated 5 years ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆668Updated 5 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆552Updated 4 years ago
- A small reverse shell for Linux & Windows☆624Updated last year
- Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)☆1,086Updated 4 years ago
- Dumping LAPS from Python☆282Updated 3 years ago
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆229Updated 4 years ago
- Kerberoast with ACL abuse capabilities☆602Updated last year
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆776Updated 3 months ago
- ☆252Updated 5 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆372Updated 5 years ago
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that are useful for internal penetration tests and a…☆297Updated 3 weeks ago
- Active Directory Labs/exams Review☆262Updated 4 years ago
- PowerShell scripts for communicating with a remote host.☆303Updated 2 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆604Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,076Updated last year
- Generate obfuscated meterpreter shells☆232Updated 4 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆421Updated 12 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆928Updated last year
- ☆427Updated 5 years ago
- BadAssMacros - C# based automated Malicous Macro Generator.☆436Updated 4 years ago
- ☆818Updated 3 years ago