Meatballs1 / ms16-032Links
☆22Updated 9 years ago
Alternatives and similar repositories for ms16-032
Users that are interested in ms16-032 are comparing it to the libraries listed below
Sorting:
- Remote Desktop Protocol in Twisted Python☆26Updated 7 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Updated 7 years ago
- A tool to analyse JMX API security level.☆43Updated 11 years ago
- Python api for usage with cobalt strike's External C2 specification☆63Updated 6 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 6 years ago
- ☆44Updated 5 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 8 years ago
- ☆55Updated 8 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 9 years ago
- Unified repository for different Metasploit Framework payloads☆48Updated 5 years ago
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- Socks5 server over Websockets☆40Updated 7 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- sploit☆67Updated 5 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Updated 7 years ago
- Metasploit Framework☆31Updated 5 years ago
- A simple scanner to find and brute force tomcat manager logins☆28Updated 5 years ago
- Repo for proof of concept exploits and tools.☆56Updated 5 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- Win32k Elevation of Privilege Poc☆24Updated 6 years ago
- Automates credential skimming from service accounts in Windows Registry☆77Updated 5 years ago
- with metasploit☆63Updated 5 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Updated 8 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Updated 6 years ago
- A weaponized version of CVE-2018-9206☆62Updated 7 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆44Updated 4 years ago
- ☆24Updated 8 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago