MarkBuffalo / exploits
Some random exploits that may or may not be useful. Not responsible for misuse.
☆21Updated 6 years ago
Alternatives and similar repositories for exploits:
Users that are interested in exploits are comparing it to the libraries listed below
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆85Updated 2 years ago
- A list of "secrets" from JWT sample code and readme files.☆54Updated 4 years ago
- Exploit for PlaySMS 1.4 authenticated RCE☆14Updated 6 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- ☆45Updated 7 years ago
- Scripts created to help with post exploitation of a Windows host☆96Updated 4 years ago
- Tool that automates Active Directory enumeration☆89Updated 3 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- This code was used for the blogpost on secjuice.☆42Updated 5 years ago
- Just some exploits :P☆46Updated 4 years ago
- ☆9Updated 3 years ago
- Vulnerable webapp testbed☆20Updated 8 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 5 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆29Updated 6 years ago
- ☆41Updated 4 years ago
- Windows Enumeration and Privilege Escalation Script☆18Updated 5 years ago
- Enyx SNMP IPv6 Enumeration Tool☆102Updated 2 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆45Updated 2 years ago
- learning case to prepare OSWE☆37Updated 5 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Updated 4 years ago
- Merges multiple .nessus files into one file.☆44Updated 2 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- ☆37Updated last month
- A HTA shell to assist with breakout assessments.☆112Updated 3 years ago
- Samba, NFS shares spider and grepper☆71Updated 6 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆74Updated 4 years ago
- Some minor changes to Chimichurri to get it to compile on modern machines☆44Updated 9 years ago