Rvn0xsy / CVE_2020_0796_CNA
Cobalt Strike AggressorScripts CVE-2020-0796
☆78Updated 4 years ago
Alternatives and similar repositories for CVE_2020_0796_CNA:
Users that are interested in CVE_2020_0796_CNA are comparing it to the libraries listed below
- Cobalt Strike Aggressor Scripts☆70Updated 5 years ago
- ☆28Updated 5 years ago
- 使得Cobaltstrike支持Atexec☆87Updated 4 years ago
- Web ExternalC2 Demo☆51Updated 4 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 4 years ago
- ☆93Updated 3 years ago
- CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)☆44Updated 4 years ago
- ☆77Updated 6 years ago
- 通过NetSessionEnum获取域内机器对应用户☆66Updated 5 years ago
- ☆91Updated 6 years ago
- SecistSploit☆16Updated 6 years ago
- Bypass cobaltstrike beacon config scan☆84Updated 3 years ago
- AggressorScript-UploadAndRunFrp/上传frpc并且运行frpc☆63Updated 5 years ago
- CVE-2020-0688 - Exchange☆65Updated 5 years ago
- Use to perform Microsoft exchange account brute-force.☆73Updated 4 years ago
- 窃取mstsc中的用户明文凭据☆45Updated 4 years ago
- Use to browse the share file by eas(Exchange Server ActiveSync)☆45Updated 4 years ago
- 蚁剑其他脚本AES编/解码器☆36Updated 5 years ago
- CVE-2020-10199 回显版本☆31Updated 10 months ago
- WinrmCmd/WinrmShell ( Golang\PowerShell\Python)☆33Updated 4 years ago
- ☆35Updated 5 years ago
- MSFRottenPotato built as a Reflective DLL. Work in progress. Gotta love Visual C++☆30Updated 6 years ago
- an impacket-dependent script exploiting CVE-2019-1040☆71Updated 4 years ago
- cobalt strike 自用脚本☆28Updated 4 years ago
- A fastjson payload generator☆57Updated 4 years ago
- SharpAddDomainMachine☆68Updated 3 years ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆47Updated 3 years ago
- mssql 终端连接工具|命令执行☆40Updated 5 years ago
- CVE-2021-26855 & CVE-2021-27065☆27Updated 4 years ago
- java web 压缩文件 安全 漏洞☆20Updated 5 years ago