Malwar3Ninja / Exploitation-of-Log4j2-CVE-2021-44228
IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228
☆15Updated 2 years ago
Related projects: ⓘ
- ☆22Updated this week
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 3 years ago
- Custom pentesting tools☆23Updated 3 years ago
- Simple C2 over the Trello API☆37Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- Cobalt Strike/C2 Servers☆12Updated 3 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 3 years ago
- A golang tool that uses the dehashed.com API to search for compromised assets.☆8Updated 3 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆48Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆30Updated last year
- ☆33Updated 6 years ago
- Small python script wrapper for automating hashcat commands☆32Updated 3 years ago
- Python script to tamper with pages to test for Log4J Shell vulnerability.☆12Updated 2 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆15Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Disable Windows Defender All Version☆31Updated 3 years ago
- ☆51Updated 3 years ago
- webshells written with malice☆22Updated 7 years ago
- ☆29Updated this week
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆26Updated 3 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆59Updated 3 years ago
- ☆22Updated 2 years ago
- HiveNightmare a.k.a. SeriousSam Local Privilege Escalation in Windows – CVE-2021-36934☆8Updated 3 years ago
- powershell tool for VM evasion☆43Updated 3 years ago
- Malicious Macro attack techniques for red teamers☆15Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago