ariary / DogWalk-rce-pocView external linksLinks
πΎDogwalk PoC (using diagcab file to obtain RCE on windows)
β78Aug 11, 2022Updated 3 years ago
Alternatives and similar repositories for DogWalk-rce-poc
Users that are interested in DogWalk-rce-poc are comparing it to the libraries listed below
Sorting:
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code executionβ23Jun 16, 2022Updated 3 years ago
- β15Jan 26, 2023Updated 3 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic loβ¦β25Jan 23, 2023Updated 3 years ago
- A mini project to exfiltrate data via QR codesβ19Dec 5, 2025Updated 2 months ago
- β88Jul 31, 2022Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansibleβ12Sep 15, 2023Updated 2 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)β64Feb 14, 2022Updated 4 years ago
- β94May 14, 2022Updated 3 years ago
- Cobalt Strike Get clipboard pluginβ15Aug 11, 2023Updated 2 years ago
- Collection of scripts that I created to make my life easier.β12May 10, 2021Updated 4 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.β85May 7, 2023Updated 2 years ago
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)β254Sep 15, 2022Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.β55Jun 30, 2021Updated 4 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.β125Apr 9, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by tampering via ptraceβ18Aug 3, 2023Updated 2 years ago
- Framework for Kerberos relayingβ939May 29, 2022Updated 3 years ago
- β39Oct 12, 2022Updated 3 years ago
- CVE-2022-22947_POC_EXPβ13Mar 17, 2022Updated 3 years ago
- Generate droppers with encrypted payloads automatically.β54Nov 16, 2021Updated 4 years ago
- Tomcat backdoor based on CS blogβ29Jun 30, 2023Updated 2 years ago
- AAD related enumeration in Nimβ132Sep 7, 2023Updated 2 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.β321Sep 23, 2022Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints πβ34Aug 16, 2023Updated 2 years ago
- C# project to Reflectively load .Net assemblies in memoryβ19Jun 19, 2024Updated last year
- A SOCKS proxy for Citrix.β96Dec 8, 2022Updated 3 years ago
- β106Jul 31, 2024Updated last year
- β827Sep 9, 2022Updated 3 years ago
- β142May 4, 2022Updated 3 years ago
- Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profilesβ418Apr 6, 2023Updated 2 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!β26May 26, 2022Updated 3 years ago
- β61Aug 30, 2021Updated 4 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible outputβ57Jun 2, 2024Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.β98Apr 13, 2023Updated 2 years ago
- β121Jun 17, 2022Updated 3 years ago
- β477Nov 20, 2022Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysisβ50May 3, 2022Updated 3 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentialsβ21Dec 3, 2020Updated 5 years ago
- β113Oct 10, 2022Updated 3 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.β141Sep 29, 2021Updated 4 years ago