Rvn0xsy / CVE_2020_0796_CNA
Cobalt Strike AggressorScripts CVE-2020-0796
☆79Updated 4 years ago
Alternatives and similar repositories for CVE_2020_0796_CNA:
Users that are interested in CVE_2020_0796_CNA are comparing it to the libraries listed below
- Cobalt Strike Aggressor Scripts☆71Updated 5 years ago
- 使得Cobaltstrike支持Atexec☆87Updated 4 years ago
- ☆93Updated 3 years ago
- Web ExternalC2 Demo☆51Updated 4 years ago
- ☆28Updated 4 years ago
- ☆77Updated 6 years ago
- Play Doh Windows ACL Tools☆60Updated 2 years ago
- Bypass cobaltstrike beacon config scan☆82Updated 3 years ago
- 通过NetSessionEnum获取域内机器对应用户☆66Updated 4 years ago
- 蚁剑其他脚本AES编/解码器☆36Updated 5 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 3 years ago
- A fastjson payload generator☆57Updated 4 years ago
- CVE-2020-0688 - Exchange☆66Updated 4 years ago
- AggressorScript-UploadAndRunFrp/上传frpc并且运行frpc☆63Updated 5 years ago
- ☆91Updated 6 years ago
- SecistSploit☆16Updated 6 years ago
- CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)☆44Updated 4 years ago
- a mini tool to dump password and NTLM hash from WDigest & MSV1_0 & tspkg, as a result of study of mimikatz☆78Updated 6 years ago
- Use to perform Microsoft exchange account brute-force.☆73Updated 3 years ago
- Just pick out the code we need.☆61Updated 5 years ago
- mssql 终端连接工具|命令执行☆40Updated 5 years ago
- 窃取mstsc中的用户明文凭据☆45Updated 3 years ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆45Updated 3 years ago
- an impacket-dependent script exploiting CVE-2019-1040☆72Updated 4 years ago
- SharpAddDomainMachine☆67Updated 3 years ago
- asmx China Chopper WebShell☆46Updated 6 years ago
- ☆35Updated 5 years ago
- WinrmCmd/WinrmShell ( Golang\PowerShell\Python)☆33Updated 4 years ago
- beacon,aggressor-scripts,cna,cobalt-strike,email☆36Updated 5 years ago
- CVE-2020-10199 回显版本☆31Updated 7 months ago