ThanHuuTuan / Telerik_CVE-2019-18935
TelerikUI Vulnerability Scanner (CVE-2019-18935)
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Telerik_CVE-2019-18935
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆19Updated 2 years ago
- the most basic DLL ever to pop a cmd.☆22Updated 4 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Updated 4 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- visually see issues with supported cipher suites☆15Updated 5 months ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- Active Directory Group Policy analyzer☆13Updated 5 years ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆24Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated last month
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 3 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- ☆14Updated 3 years ago
- Set of ultra technical notes about AD☆18Updated 6 years ago
- Kibana app for RedELK☆16Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated this week
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 5 years ago
- ☆30Updated 6 years ago
- Periodically check hashcat cracking progress and notify of success.☆11Updated 5 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆18Updated 7 years ago
- ☆17Updated last year
- Python support package to parse IP and host inputs from network based tooling☆11Updated last year
- ☆16Updated 6 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- Platform independent library for interfacing windows security descriptors☆16Updated 2 months ago
- Cisco Unfied Call Manager enumeration☆23Updated 2 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- Malicious Macro attack techniques for red teamers☆15Updated 3 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year