Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.
☆44Aug 7, 2020Updated 5 years ago
Alternatives and similar repositories for Firework
Users that are interested in Firework are comparing it to the libraries listed below
Sorting:
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- ☆16May 6, 2015Updated 10 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Centralized Firewall Control☆21Feb 5, 2018Updated 8 years ago
- Powershell script to setup windows port forwarding using native netsh client☆124Aug 6, 2018Updated 7 years ago
- ☆63Mar 21, 2018Updated 7 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- A bunch of useful SSH tools for powershell☆120Oct 24, 2018Updated 7 years ago
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- Using IPv6 to Bypass Security☆92Sep 4, 2025Updated 6 months ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- Burp Suite Attack Selector Plugin☆60Nov 23, 2017Updated 8 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- goddi (go dump domain info) dumps Active Directory domain information☆429May 31, 2022Updated 3 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆372Feb 23, 2024Updated 2 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆342Dec 6, 2018Updated 7 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Windows Stagers to circumvent restrictive network environments☆69Sep 23, 2024Updated last year
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- ☆182Feb 21, 2022Updated 4 years ago