Sq00ky / Zero-Logon-ExploitLinks
Test tool for CVE-2020-1472
☆35Updated 2 years ago
Alternatives and similar repositories for Zero-Logon-Exploit
Users that are interested in Zero-Logon-Exploit are comparing it to the libraries listed below
Sorting:
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆212Updated 2 years ago
- Active Directory Wordlists☆99Updated 5 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 3 years ago
- Markdown reporting templates and Pandoc styling references to generate sleek reports for OSCP/PWK with little effort.☆205Updated 4 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- Create a list of possible usernames for bruteforcing☆72Updated last year
- Powershell script to extract information from boot PXE☆147Updated 6 years ago
- ☆76Updated 4 years ago
- Used to check for TCP and UDP egress filtering on both windows and unix client systems☆146Updated 4 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆64Updated 4 years ago
- ☆48Updated 3 years ago
- Basic Website template Django 2.2 Example + Python3☆53Updated 3 years ago
- My OSCP notes☆222Updated last year
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆335Updated 9 months ago
- Burp request/response timer☆31Updated 7 years ago
- ☆82Updated 5 years ago
- Active Directory Labs/exams Review☆258Updated 4 years ago
- ☆48Updated last year
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆99Updated 4 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 4 years ago
- Scripts featured in the book How to Hack Like a Legend☆146Updated 2 years ago
- Abertay CMP202 Project☆34Updated 4 years ago
- ☆66Updated 3 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆303Updated 2 years ago
- Suggests programs to run against services found during the enumeration phase of a Pentest☆95Updated last year
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆63Updated 5 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Updated 5 years ago
- Exploits for the TryHackMe room hackerNote☆30Updated 5 years ago
- Active Directory Lab for Penetration Testing☆52Updated 3 weeks ago