ariary / DogWalk-rce-pocView external linksLinks
🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)
☆78Aug 11, 2022Updated 3 years ago
Alternatives and similar repositories for DogWalk-rce-poc
Users that are interested in DogWalk-rce-poc are comparing it to the libraries listed below
Sorting:
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Jun 16, 2022Updated 3 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆25Jan 23, 2023Updated 3 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 2 months ago
- ☆88Jul 31, 2022Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Feb 14, 2022Updated 4 years ago
- ☆94May 14, 2022Updated 3 years ago
- Cobalt Strike Get clipboard plugin☆15Aug 11, 2023Updated 2 years ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆85May 7, 2023Updated 2 years ago
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)☆254Sep 15, 2022Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Jun 30, 2021Updated 4 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆125Apr 9, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Aug 3, 2023Updated 2 years ago
- Framework for Kerberos relaying☆939May 29, 2022Updated 3 years ago
- ☆39Oct 12, 2022Updated 3 years ago
- CVE-2022-22947_POC_EXP☆13Mar 17, 2022Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- AAD related enumeration in Nim☆132Sep 7, 2023Updated 2 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆321Sep 23, 2022Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- A SOCKS proxy for Citrix.☆96Dec 8, 2022Updated 3 years ago
- ☆106Jul 31, 2024Updated last year
- ☆827Sep 9, 2022Updated 3 years ago
- ☆142May 4, 2022Updated 3 years ago
- Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles☆418Apr 6, 2023Updated 2 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- ☆61Aug 30, 2021Updated 4 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆57Jun 2, 2024Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆98Apr 13, 2023Updated 2 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- ☆477Nov 20, 2022Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50May 3, 2022Updated 3 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- ☆113Oct 10, 2022Updated 3 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Sep 29, 2021Updated 4 years ago