ar0dd / CVE-2020-5902
POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!
☆13Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2020-5902
- Leak windows system info through a docx file☆12Updated 4 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 4 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- Microsoft Applocker evasion tool☆38Updated 4 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 3 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 4 years ago
- ☆19Updated 4 years ago
- CVE-2020-3452 exploit☆24Updated 4 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆28Updated 5 years ago
- ☆15Updated 4 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆34Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.☆37Updated 3 years ago
- discover IP ranges. check email security. survey domains.☆38Updated last year
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆14Updated 5 years ago
- adding a backdooruser using win32api☆79Updated 4 years ago
- Powershell SMBv3 Compression checker☆28Updated last year
- ☆16Updated 3 years ago
- I used this to see if an EDR is running in Safe Mode☆33Updated 3 years ago
- CVE-2020-5837 exploit☆41Updated 4 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 3 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 4 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆107Updated 4 years ago
- ☆51Updated 5 years ago