VNCERT-CC / 0dayex-checkerLinks
Zeroday Microsoft Exchange Server checker (Virtual Patching checker)
☆67Updated 3 years ago
Alternatives and similar repositories for 0dayex-checker
Users that are interested in 0dayex-checker are comparing it to the libraries listed below
Sorting:
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- ☆55Updated last year
- Analyzing AD domains for security risks related to user accounts☆64Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- A swiss army knife for pentesting networks☆26Updated 3 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Updated 3 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆83Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- ☆43Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 3 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 3 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated last month
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- This repository provides the core to build your own External C2 Server and Connector for Brute Ratel C4☆55Updated 3 years ago
- ☆53Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Updated 3 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆43Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- ☆22Updated 2 years ago