M507 / Miner
Local Privilege Escalation Miner
☆27Updated 3 years ago
Alternatives and similar repositories for Miner:
Users that are interested in Miner are comparing it to the libraries listed below
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- ☆12Updated 4 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated 3 weeks ago
- miscellaneous sploit scripts/hacks☆16Updated 2 months ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- ☆18Updated last year
- PoC for CVE-2021-4034 dubbed pwnkit☆34Updated 3 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Configurable, Community driven, HTTP C2 Profile☆17Updated last month
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- Cisco Unfied Call Manager enumeration☆23Updated 2 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆32Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆34Updated 3 years ago
- ☆11Updated 5 years ago
- RDP Checker☆63Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Work in Progress repo☆14Updated 6 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆17Updated 3 years ago
- A little implant which SSH's back with a shell☆36Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 2 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆20Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year