StarfireLab / AutoZerologonLinks
Zerologon自动化脚本
☆96Updated 2 years ago
Alternatives and similar repositories for AutoZerologon
Users that are interested in AutoZerologon are comparing it to the libraries listed below
Sorting:
- 通过websocket在IIS8(Windows Server 2012)以上实现socks5代理☆95Updated last year
- 根据攻防以及域信息收集经验dump快而有用的域信息☆103Updated 2 years ago
- ad vulnerability scanner☆74Updated 2 years ago
- Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具☆110Updated 2 years ago
- Zerologon exploit with restore DC password automatically☆140Updated last year
- 密码收集☆58Updated 3 years ago
- Lsass memory dump.☆55Updated 2 years ago
- ☆94Updated 3 years ago
- 域内普通域用户权限查找域内所有计算机上登录的用户☆151Updated 2 years ago
- ☆49Updated 2 years ago
- 利用EFSRPC协议批量探测出网☆67Updated 2 years ago
- 常用功能的DLL插件☆85Updated 3 months ago
- 窃取当前用户的ssh,sudo密码☆69Updated 2 years ago
- 批量获取域内机器桌面文件☆80Updated 3 years ago
- 检测域内常见一把梭漏洞,包括:NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare☆79Updated 2 years ago
- 通过C/C++实现的 Windows RID Hijacking persistence technique (RID劫持 影子账户 账户克隆).☆88Updated 4 years ago
- 一键出网探测工具☆73Updated 2 years ago
- Cobalt Strike plugin☆53Updated last year
- Cobalt Strike random C2 Profile 修改版(适配腾讯云函数,亚马逊云函数和CrossC2自定义protocol)☆90Updated 2 years ago
- ruoyi 后台定时任务注入哥斯拉内存马☆52Updated last year
- 域控 学习+攻击大纲☆66Updated 6 years ago
- Nacos JRaft Hessian 反序列化 RCE EXP☆65Updated 2 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user; Adding the sam_the_admin_maq when MachineAccoun…☆22Updated last year
- 一个基于DNS隧道的简单C2☆61Updated 3 years ago
- Cobalt Strike BOF that Add a user to localgroup by samr☆132Updated 3 years ago
- 一个简易的woodpecker反序列化插件☆44Updated last year
- 主要用于隐藏进程真实路径,进程带windows真签名☆118Updated last year
- 魔改shadowsocks,实现socks5内网穿透。☆63Updated last month
- (批量化改造)sharpwmi是一个基于rpc的横向移动工具,具有上传文件和执行命令功能。☆109Updated 4 years ago
- ActiveMQ RCE (CVE-2023-46604) 回显利用工具☆39Updated last year