bstapes / jenkins-decryptLinks
Credentials dumper for Jenkins
☆46Updated last year
Alternatives and similar repositories for jenkins-decrypt
Users that are interested in jenkins-decrypt are comparing it to the libraries listed below
Sorting:
- Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.☆121Updated 4 years ago
- POC for RCE using vulnerabilities described in VMSA-2023-0001☆148Updated 2 years ago
- Cobalt Strike AggressorScripts For Red Team☆156Updated 4 years ago
- ☆47Updated 3 years ago
- proxyshell payload generate☆75Updated 4 years ago
- resource-based constrained delegation RBCD☆46Updated 4 years ago
- Some Attacks of Exchange SSRF ProxyLogon&ProxyShell☆166Updated 4 years ago
- wo ee cve-2022-2185 gitlab authenticated rce☆80Updated 3 years ago
- Search msDS-AllowedToActOnBehalfOfOtherIdentity☆35Updated 4 years ago
- PortBender修改为exe版本☆29Updated 2 years ago
- CobaltStrike and Google Auth twice☆63Updated 4 years ago
- If you only have hash, you can still operate exchange☆78Updated 4 years ago
- Go实现部分Rubeus功能,可执行asktgt, asktgs, s4u, describe ticket, renew ticket, asreproast等☆142Updated 3 years ago
- CobaltStrike 4.0 - 4.5 Patch☆178Updated 3 years ago
- PoC for ManageEngine ADAudit Plus CVE-2022-28219☆45Updated 3 years ago
- ☆15Updated 2 years ago
- Red TL;DR Database is a set of text data that provides search for red-tldr. If you don’t know red-tldr yet, please read the documentation…☆41Updated 3 years ago
- ☆182Updated 4 years ago
- ☆102Updated 3 years ago
- Dumping Windows Local Credentials Tools/Tricks☆69Updated 5 years ago
- ☆46Updated 4 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆38Updated 3 years ago
- 利用NTLM Hash读取Exchange邮件☆58Updated 2 years ago
- PoC for CVE-2021-4034☆60Updated 3 years ago
- CVE-2021-26855 & CVE-2021-27065☆28Updated 4 years ago
- NTLM relay test.☆194Updated 6 months ago
- Microsoft Exchange Server Poc☆85Updated 4 years ago
- 创建服务持久化☆108Updated 4 years ago
- 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆149Updated 3 years ago
- ☆94Updated 7 years ago