T13nn3s / CVE-2020-1350
This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service
☆14Updated last year
Related projects: ⓘ
- Standalone version of my AES Powershell payload for Cobalt Strike.☆106Updated 4 years ago
- Smart overlay for Cobalt Strike PS function☆30Updated 5 years ago
- ☆69Updated 3 years ago
- juicypotato for win10 > 1803 & win server 2019☆95Updated 3 years ago
- Basic password spraying tool for internal tests and red teaming☆89Updated 4 years ago
- Automate Network sessions enumeration of connected users in the domain, to facilitate AD Reconnaissance for Adversary simulation & Red Te…☆15Updated 3 years ago
- ☆50Updated 4 years ago
- Aggressor Scripts for Cobalt Strike☆77Updated 6 months ago
- This Repository contains the stuff related to windows Active directory environment exploitation☆145Updated last year
- A little tool to play with Kerberos.☆65Updated last year
- ☆22Updated 6 years ago
- Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.☆37Updated 3 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆34Updated 4 years ago
- Powershell SMBv3 Compression checker☆28Updated last year
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆64Updated 4 years ago
- Splunk Dashboard for CobaltStrike logs☆83Updated 3 years ago
- Port of Invoke-Excel4DCOM☆100Updated 4 years ago
- Citrix ADC Vulns☆85Updated 4 years ago
- ☆38Updated 4 years ago
- ☆113Updated this week
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 6 years ago
- Yet another LSASS dumper☆77Updated 3 years ago
- Kerberos laboratory to better understand and then detecting attack on kerberos☆67Updated 3 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Updated last year
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆67Updated 3 years ago
- guest→system(UAC手动提权)☆74Updated 4 years ago
- Contains poc's and my research works☆31Updated last year
- ☆73Updated this week
- initial commit☆42Updated 7 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆171Updated 4 years ago