ac3lives / kyocera-cve-2022-1026Links
An unauthenticated data extraction vulnerability in Kyocera printers, which allows for recovery of cleartext address book and domain joined passwords
☆17Updated 2 years ago
Alternatives and similar repositories for kyocera-cve-2022-1026
Users that are interested in kyocera-cve-2022-1026 are comparing it to the libraries listed below
Sorting:
- ☆334Updated last month
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆618Updated 5 months ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆412Updated last year
- Enhance Your Active Directory Password Spraying with User Intelligence.☆273Updated last month
- Execute commands interactively on remote Windows machines using the WinRM protocol☆244Updated this week
- PowerShell Obfuscator☆209Updated last month
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆395Updated 2 months ago
- Multiplayer pivoting solution☆439Updated 2 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆334Updated 6 months ago
- Tool to remotely dump secrets from the Windows registry☆497Updated 4 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆137Updated 6 months ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆527Updated 5 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆164Updated 3 months ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆442Updated last year
- Tool for Active Directory Certificate Services enumeration and abuse☆13Updated last year
- Amsi Bypass payload that works on Windwos 11☆375Updated 2 years ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆258Updated last year
- psexecsvc - a python implementation of PSExec's native service implementation☆217Updated 8 months ago
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆321Updated 3 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆444Updated 11 months ago
- ☆201Updated 4 months ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆465Updated 4 months ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆217Updated last year
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆340Updated 2 weeks ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆327Updated 11 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆248Updated 7 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆383Updated 4 months ago
- ☆366Updated 7 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆188Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆314Updated 2 weeks ago