MauroEldritch / lempoLinks
LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberia 2018
☆11Updated 5 years ago
Alternatives and similar repositories for lempo
Users that are interested in lempo are comparing it to the libraries listed below
Sorting:
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Updated 5 years ago
- ☆17Updated 6 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Updated 5 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- Execute shellcode with syscalls from C# .dll☆12Updated 5 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- ☆11Updated 6 years ago
- Create COM Objects backed by Scripts, not DLLs☆9Updated 7 years ago
- ☆18Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago
- ☆28Updated 7 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- ADD/SUB encoder for alphanumeric shellcode☆9Updated 5 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Updated 6 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆28Updated 5 years ago
- Everything related to Cobalt Strike☆15Updated 5 years ago
- Apfell implant written in C#.☆8Updated 4 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 5 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- CVE-2019-10149 privilege escalation☆9Updated 5 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- ☆21Updated 5 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆14Updated 7 years ago
- ☆14Updated 5 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 7 years ago
- Working exploit code for CVE-2019-17625☆18Updated 5 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Updated 5 years ago