akabe1 / windows_exploit_dowser
A simple tool which could be useful to identify the exploits afflicting a Windows OS
☆127Updated last year
Alternatives and similar repositories for windows_exploit_dowser:
Users that are interested in windows_exploit_dowser are comparing it to the libraries listed below
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆106Updated 5 years ago
- Pypykatz server☆125Updated 6 years ago
- ☆122Updated 7 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Updated 5 years ago
- Exploits and advisories☆188Updated 4 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 5 years ago
- JIRA Secure Attachment Looter☆69Updated 4 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆128Updated 6 years ago
- ☆92Updated 6 years ago
- The Outlook HTML Leak Test Project☆132Updated 6 years ago
- The full story of the CLR implementation of Meterpreter☆150Updated 4 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆124Updated 6 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆182Updated 5 years ago
- ☆166Updated 7 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- ☆97Updated 6 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆201Updated last year
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- Generates anti-sandbox analysis HTA files without payloads☆118Updated 8 years ago
- Slides from various talks that I've given over the years☆117Updated last year
- Python tool to inject fake updates into unencrypted WSUS traffic☆116Updated 9 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆145Updated 5 years ago
- Responsive Command and Control System☆103Updated 2 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Updated 5 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- try privilege escalation changing sudo command☆119Updated 7 years ago
- An Insider Threat Toolkit☆149Updated 6 years ago