advanced-threat-research / CVE-2020-16899Links
CVE-2020-16899 - Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
☆20Updated 5 years ago
Alternatives and similar repositories for CVE-2020-16899
Users that are interested in CVE-2020-16899 are comparing it to the libraries listed below
Sorting:
- Harvis is designed to automate your C2 Infrastructure.☆107Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 4 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆178Updated 3 years ago
- ☆79Updated 3 months ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆67Updated 4 years ago
- Discord as a C2☆49Updated 5 years ago
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- Retrieve AD accounts description and search for password in it☆82Updated 3 years ago
- Emulate and Dissect MSF and *other* attacks☆142Updated last year
- ☆54Updated 4 years ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- POC and Scanner for CVE-2023-24055☆65Updated 3 years ago
- Common library used by SharpHound.☆100Updated 2 weeks ago
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆28Updated 2 years ago
- Kerberos laboratory to better understand and then detecting attack on kerberos☆70Updated 4 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆82Updated 4 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆87Updated 3 years ago
- ☆43Updated 3 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆44Updated 3 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆24Updated 5 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated 2 years ago
- ☆95Updated 3 years ago
- Escaping Restricted Environments and Bypassing DLP☆77Updated 7 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- (kinda) Malicious Outlook Reader☆138Updated 4 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆166Updated 4 years ago
- GUI for Volatility forensics tool written in PyQT5☆60Updated 4 years ago
- Nmap script to check vulnerability CVE-2021-21972☆27Updated 4 years ago