blackhatethicalhacking / CVE-2020-2034-POC
Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal
☆11Updated 4 years ago
Alternatives and similar repositories for CVE-2020-2034-POC:
Users that are interested in CVE-2020-2034-POC are comparing it to the libraries listed below
- A web shell for pivoting and lateral movement☆33Updated 7 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960☆2Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- ☆17Updated 4 years ago
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆15Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆23Updated 4 years ago
- ☆26Updated 2 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 3 years ago
- Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077☆33Updated 3 years ago
- Just some random small tools for dealing with asp.net Forms Authentication Cookies☆23Updated 3 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆78Updated last year
- ☆10Updated 2 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆31Updated last year
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆12Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- NSE script to detect ProxyOracle☆14Updated 3 years ago
- ☆19Updated 4 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- Exploit for Microsoft SharePoint 2019☆14Updated last year
- client-side prototype pullution vulnerability scanner☆46Updated 3 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆31Updated 2 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆32Updated 3 years ago