SecurityRiskAdvisors / cmd.jsp
A super small jsp webshell with file upload capabilities.
☆297Updated 3 years ago
Alternatives and similar repositories for cmd.jsp
Users that are interested in cmd.jsp are comparing it to the libraries listed below
Sorting:
- Changes for Visual Studio 2013☆117Updated 9 years ago
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆178Updated 2 years ago
- ☆294Updated 4 years ago
- Office 365 and Exchange Enumeration☆186Updated 6 years ago
- ☆293Updated 10 months ago
- cve-2020-0688☆324Updated last year
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆220Updated 5 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆143Updated 3 years ago
- CVE-2019-1388 UAC提权 (nt authority\system)☆186Updated 5 years ago
- ntlm relay attack to Exchange Web Services☆331Updated 7 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆743Updated 4 years ago
- Standalone binaries for Linux/Windows of Impacket's examples☆729Updated last year
- CVE-2018-8581☆372Updated 2 years ago
- ☆187Updated 4 years ago
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆351Updated 3 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆202Updated 6 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆167Updated 2 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆406Updated last year
- ☆382Updated 3 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆602Updated 2 years ago
- NTDS.dit offline dumper with non-elevated☆217Updated 7 years ago
- Use python to perform Kerberos pre-auth bruteforcing☆199Updated 2 years ago
- mRemoteNG Config File Decrypt☆83Updated 2 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆432Updated 2 years ago
- MOGWAI LABS JMX exploitation toolkit☆201Updated 2 years ago
- Juicy Potato for x86 Windows☆120Updated 5 years ago
- IOXIDResolver.py from AirBus Security☆247Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,013Updated 5 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆537Updated 2 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆202Updated 2 years ago