akabe1 / windows_exploit_dowserLinks
A simple tool which could be useful to identify the exploits afflicting a Windows OS
☆125Updated 2 years ago
Alternatives and similar repositories for windows_exploit_dowser
Users that are interested in windows_exploit_dowser are comparing it to the libraries listed below
Sorting:
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Updated 6 years ago
- A Metasploit auto auxiliary script☆103Updated 3 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Updated 6 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- ☆122Updated 7 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Updated 7 years ago
- Pypykatz agent implemented in .NET☆84Updated 6 years ago
- Pypykatz server☆125Updated 6 years ago
- Red Team Resources☆60Updated 6 years ago
- ☆98Updated 6 years ago
- Exploits and advisories☆202Updated last month
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 8 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Updated 5 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- ☆73Updated 6 years ago
- ☆52Updated 6 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆136Updated last year
- ☆22Updated 8 years ago
- ☆94Updated 6 years ago
- Burp Suite extension to perform Kerberos authentication☆105Updated last year
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Updated 8 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- A simple embedded Linux backdoor.☆199Updated 5 years ago
- ☆36Updated 7 years ago
- How To Execute Shellcode via HTA☆141Updated 7 years ago
- ☆78Updated 8 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago