Rvn0xsy / CVE_2020_0796_CNALinks
Cobalt Strike AggressorScripts CVE-2020-0796
☆78Updated 4 years ago
Alternatives and similar repositories for CVE_2020_0796_CNA
Users that are interested in CVE_2020_0796_CNA are comparing it to the libraries listed below
Sorting:
- Cobalt Strike Aggressor Scripts☆70Updated 5 years ago
- 使得Cobaltstrike支持Atexec☆88Updated 5 years ago
- ☆28Updated 5 years ago
- ☆93Updated 3 years ago
- ☆77Updated 7 years ago
- Exchange2010 authorized RCE☆156Updated 4 years ago
- Web ExternalC2 Demo☆51Updated 4 years ago
- Bypass cobaltstrike beacon config scan☆84Updated 4 years ago
- A collection of C# tools for various purposes (kerberoasting, tickets, mimikatz, privesc, domain enumeration and more)☆78Updated 5 years ago
- mssql 终端连接工具|命令执行☆40Updated 5 years ago
- AggressorScript-UploadAndRunFrp/上传frpc并且运行frpc☆63Updated 5 years ago
- 通过NetSessionEnum获取域内机器对应用户☆66Updated 5 years ago
- CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)☆44Updated 5 years ago
- My exercise of using Exchange Web Service(EWS)☆54Updated 4 years ago
- 窃取mstsc中的用户明文凭据☆47Updated 4 years ago
- ☆92Updated 6 years ago
- proxylogon exploit - CVE-2021-26857☆113Updated 4 years ago
- an impacket-dependent script exploiting CVE-2019-1040☆72Updated 4 years ago
- SharpAddDomainMachine☆68Updated 3 years ago
- cobalt strike 自用脚本☆29Updated 4 years ago
- WinrmCmd/WinrmShell ( Golang\PowerShell\Python)☆33Updated 4 years ago
- cobalt strike 自启动脚本☆70Updated 8 years ago
- just test☆65Updated 2 years ago
- aggressor-script 中文翻译 aggressor-script 使用☆42Updated 7 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 4 years ago
- CVE-2020-10199 回显版本☆31Updated last year
- MSFRottenPotato built as a Reflective DLL. Work in progress. Gotta love Visual C++☆31Updated 6 years ago
- beacon,aggressor-scripts,cna,cobalt-strike,email☆36Updated 6 years ago
- Python script for auto remove AV☆45Updated 5 years ago
- ☆35Updated 5 years ago