MrTiz / CVE-2020-0688Links
Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys
☆20Updated 4 years ago
Alternatives and similar repositories for CVE-2020-0688
Users that are interested in CVE-2020-0688 are comparing it to the libraries listed below
Sorting:
- ☆18Updated 4 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆28Updated last year
- A malicious .cab creation tool for CVE-2021-40444☆13Updated 3 years ago
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆35Updated 3 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Reverse shell macro using Word VBA☆14Updated 4 years ago
- Execute embedded Mimikatz☆13Updated 3 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- I used this to see if an EDR is running in Safe Mode☆37Updated 4 years ago
- Windows 权限提升 BadPotato☆13Updated 4 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Port forwarding via MSRPC (445/tcp) [WIP]☆33Updated 3 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆54Updated 3 years ago
- Kudzu is a Go C2 platform with an emphasis on extensibility.☆11Updated 4 years ago
- Unpacking tool for the zipExec Crypter☆13Updated 3 years ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Updated 3 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆26Updated 4 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Updated last year
- ☆14Updated 3 years ago
- Red Team C2 and Post Exploitation code☆36Updated last week
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Updated 4 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 3 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- evasion of defender☆9Updated 2 years ago