SardinasA / FortiVPN-Scanner
Extract Useful info from SSL VPN Directory Traversal Vulnerability (FG-IR-18-384)
☆11Updated 3 years ago
Related projects: ⓘ
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆19Updated 8 months ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- ☆22Updated this week
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 3 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 3 years ago
- Shell hunter for AF☆34Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆16Updated 3 years ago
- ☆20Updated this week
- Post-exploitation tool for attacking Active Directory domain controllers☆15Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Ansible Cobalt Strike (Docker)☆14Updated 2 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆14Updated last year
- Poc script for ProxyShell exploit chain in Exchange Server☆16Updated 2 years ago
- pwncat windows c2 components☆17Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago
- Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960☆2Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- ☆23Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆14Updated 4 years ago
- ☆16Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- ☆16Updated 2 years ago
- ☆22Updated 3 years ago
- Very Easy Relative Backdoor Application☆12Updated 3 years ago
- Automate Auxiliary Module in Metasploit☆19Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆30Updated last year
- Free Advance encryptor for Anon Cloud☆17Updated last year