certat / exchange-scansView external linksLinks
A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell
☆15Sep 3, 2021Updated 4 years ago
Alternatives and similar repositories for exchange-scans
Users that are interested in exchange-scans are comparing it to the libraries listed below
Sorting:
- ☆24Jan 31, 2016Updated 10 years ago
- x86 Assembly Code Examples for Blog Posts☆18Aug 2, 2022Updated 3 years ago
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Apr 23, 2022Updated 3 years ago
- Reflective DLL self-loading as a library☆21May 3, 2025Updated 9 months ago
- ☆11Feb 14, 2023Updated 2 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 2 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Sep 13, 2018Updated 7 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆35Feb 10, 2021Updated 5 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Jul 21, 2024Updated last year
- Azure AD Identity Protection Cookie Spoofing☆35Sep 2, 2023Updated 2 years ago
- ☆36Oct 1, 2024Updated last year
- Any presentation we've given at FortyNorth Security☆34Sep 27, 2021Updated 4 years ago
- Reasonably undetected shellcode stager and executer.☆36May 23, 2025Updated 8 months ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆74Dec 7, 2023Updated 2 years ago
- ☆14Nov 21, 2025Updated 2 months ago
- ☆12Mar 19, 2023Updated 2 years ago
- Numbeo Unofficial API☆15Oct 16, 2022Updated 3 years ago
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆36Feb 27, 2023Updated 2 years ago
- Inject shellcode into a valid BMP/GIF image.☆34Sep 7, 2020Updated 5 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Nov 14, 2017Updated 8 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 9 months ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- ☆14Jul 26, 2017Updated 8 years ago
- Users can submit orders to milady pool and have their orders only execute at optimal prices☆10Sep 17, 2024Updated last year
- Telegraf integration (NON OFFICIAL) to Monitor Asterisk VoIP Open Source Software with basica metrics like calls, SIP peers, IAX2 peers, …☆12Nov 9, 2021Updated 4 years ago
- ☆11Updated this week
- A remapper for Touhou Project☆12Mar 24, 2023Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆41Jun 30, 2022Updated 3 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 7 months ago
- [MIRROR] Templates and scripts to provide Windows and Linux machines with packer and vagrant☆10May 10, 2025Updated 9 months ago
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- A small stuff of telegram bot for pentest and information gathering.☆11Oct 3, 2020Updated 5 years ago
- PopCap's SexyAppFramework☆14Jun 20, 2021Updated 4 years ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- Collection of antivirus bypass techniques☆12Nov 20, 2023Updated 2 years ago