SecurityRiskAdvisors / cmd.jspLinks
A super small jsp webshell with file upload capabilities.
☆300Updated 3 years ago
Alternatives and similar repositories for cmd.jsp
Users that are interested in cmd.jsp are comparing it to the libraries listed below
Sorting:
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆182Updated 3 years ago
- cve-2020-0688☆324Updated last year
- Changes for Visual Studio 2013☆118Updated 10 years ago
- ☆296Updated 4 years ago
- Office 365 and Exchange Enumeration☆186Updated 6 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆222Updated 5 years ago
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆356Updated 3 years ago
- ntlm relay attack to Exchange Web Services☆333Updated 7 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆748Updated 4 years ago
- CVE-2019-1388 UAC提权 (nt authority\system)☆189Updated 5 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆143Updated 3 years ago
- Standalone binaries for Linux/Windows of Impacket's examples☆729Updated last year
- CVE-2018-8581☆372Updated 2 years ago
- Juicy Potato for x86 Windows☆122Updated 5 years ago
- IOXIDResolver.py from AirBus Security☆253Updated last year
- Convert Cobalt Strike profiles to modrewrite scripts☆606Updated 2 years ago
- Scripts created to help with post exploitation of a Windows host☆97Updated 4 years ago
- ☆293Updated 11 months ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆412Updated last year
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆204Updated 6 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆434Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,020Updated 5 years ago
- Kerberos Exploitation Kit☆151Updated 10 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆547Updated 2 years ago
- ☆186Updated 4 years ago
- SNMP data gather scripts☆80Updated last year
- mRemoteNG Config File Decrypt☆84Updated 2 years ago
- ☆307Updated 6 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆168Updated 3 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆601Updated 4 years ago