alt3kx / CVE-2021-21972
☆54Updated 4 years ago
Alternatives and similar repositories for CVE-2021-21972:
Users that are interested in CVE-2021-21972 are comparing it to the libraries listed below
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆43Updated 3 years ago
- Anonymize your hashcat formatted files for online cracking☆29Updated 4 months ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Creates and sends fake meeting invite☆58Updated 3 years ago
- ☆26Updated 2 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 3 months ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆85Updated 2 years ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆45Updated 2 years ago
- Convert ldapdomaindump to Bloodhound☆79Updated last year
- Exploit for PlaySMS 1.4 authenticated RCE☆14Updated 6 years ago
- This code was used for the blogpost on secjuice.☆42Updated 5 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆60Updated 6 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- An Ansible role for installing Cobalt Strike.☆76Updated this week
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 4 years ago
- Fly into Gophish with One Click (Infra Automation)☆47Updated last year
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Password Spraying Framework☆63Updated 2 years ago