NotSoSecure / Blacklist3rLinks
project-blacklist3r
☆554Updated 3 months ago
Alternatives and similar repositories for Blacklist3r
Users that are interested in Blacklist3r are comparing it to the libraries listed below
Sorting:
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆356Updated 3 years ago
- IOXIDResolver.py from AirBus Security☆252Updated last year
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆896Updated 2 years ago
- List DTDs and generate XXE payloads using those local DTDs.☆631Updated last year
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆601Updated 4 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆748Updated 4 years ago
- HopLa Burp Suite Extender plugin - Adds autocompletion support and useful payloads in Burp Suite☆753Updated last week
- A tool to embed XXE and XSS payloads in docx, odt, pptx, xlsx files (oxml_xxe on steroids)☆623Updated last year
- Standalone binaries for Linux/Windows of Impacket's examples☆729Updated last year
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆622Updated 4 months ago
- Java RMI Vulnerability Scanner☆870Updated 11 months ago
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆182Updated 3 years ago
- ☆784Updated 2 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆781Updated last year
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆280Updated 2 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆383Updated 4 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,015Updated last year
- JMX enumeration and attacking tool.☆443Updated 2 months ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆644Updated last month
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆547Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆734Updated this week
- A super small jsp webshell with file upload capabilities.☆300Updated 3 years ago
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,123Updated 11 months ago
- ☆520Updated 2 years ago
- SharPyShell - tiny and obfuscated ASP.NET webshell for C# web applications☆961Updated last year
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆619Updated 5 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,096Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,020Updated 5 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆777Updated last year
- ☆293Updated 11 months ago