advanced-threat-research / CVE-2020-16899
CVE-2020-16899 - Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
☆21Updated 4 years ago
Alternatives and similar repositories for CVE-2020-16899:
Users that are interested in CVE-2020-16899 are comparing it to the libraries listed below
- Harvis is designed to automate your C2 Infrastructure.☆104Updated 2 years ago
- not an exploit or a poc☆17Updated 2 years ago
- Kerberos laboratory to better understand and then detecting attack on kerberos☆67Updated 3 years ago
- Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077☆31Updated 3 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆51Updated 3 years ago
- ☆46Updated 2 years ago
- Searching .evtx logs for remote connections☆24Updated last year
- client-side prototype pullution vulnerability scanner☆46Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Repository for archiving Cobalt Strike configuration☆29Updated this week
- PickleC2 is a post-exploitation and lateral movements framework☆86Updated 3 years ago
- CVE-2020-2021☆20Updated 4 years ago
- NSE script to detect ProxyOracle☆14Updated 3 years ago
- ☆24Updated 5 years ago
- DO NOT RUN THIS.☆47Updated 3 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆63Updated 9 months ago
- Exploit script for CVE-2020-7961☆17Updated 4 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆25Updated 2 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆102Updated 2 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆17Updated 3 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆23Updated 4 years ago
- ☆9Updated 8 months ago
- Checks for signature requirements over LDAP☆94Updated 2 years ago
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- A little implant which SSH's back with a shell☆36Updated 2 years ago
- ☆41Updated 2 years ago