SecurityRiskAdvisors / cmd.jsp
A super small jsp webshell with file upload capabilities.
☆294Updated 3 years ago
Alternatives and similar repositories for cmd.jsp:
Users that are interested in cmd.jsp are comparing it to the libraries listed below
- Changes for Visual Studio 2013☆117Updated 9 years ago
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆177Updated 2 years ago
- Office 365 and Exchange Enumeration☆187Updated 5 years ago
- cve-2020-0688☆323Updated last year
- ☆294Updated 4 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆218Updated 5 years ago
- CVE-2019-1388 UAC提权 (nt authority\system)☆186Updated 5 years ago
- ☆293Updated 9 months ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆741Updated 4 years ago
- Juicy Potato for x86 Windows☆120Updated 5 years ago
- Standalone binaries for Linux/Windows of Impacket's examples☆728Updated last year
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆529Updated 2 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆599Updated 2 years ago
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆353Updated 3 years ago
- Use python to perform Kerberos pre-auth bruteforcing☆198Updated 2 years ago
- ☆214Updated 2 years ago
- ☆187Updated 4 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆167Updated 2 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆326Updated 5 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆202Updated 6 years ago
- Scripts created to help with post exploitation of a Windows host☆97Updated 4 years ago
- ntlm relay attack to Exchange Web Services☆331Updated 7 years ago
- Kerberos Exploitation Kit☆150Updated 10 years ago
- IOXIDResolver.py from AirBus Security☆243Updated last year
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆431Updated 2 years ago
- CVE-2018-8581☆372Updated 2 years ago
- ☆381Updated 3 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆142Updated 3 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆595Updated 4 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆375Updated 4 years ago