A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell
☆15Sep 3, 2021Updated 4 years ago
Alternatives and similar repositories for exchange-scans
Users that are interested in exchange-scans are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Jan 31, 2016Updated 10 years ago
- x86 Assembly Code Examples for Blog Posts☆18Aug 2, 2022Updated 3 years ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated last year
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Apr 23, 2022Updated 4 years ago
- Yet another obfuscated payload generator written in Rust!☆13Feb 9, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Reflective DLL self-loading as a library☆21May 3, 2025Updated last year
- A simple program to automate Microsoft OAuth device code phishing attacks.☆19Feb 15, 2024Updated 2 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆50Feb 29, 2024Updated 2 years ago
- Web Application Vulnerability Scanner☆19Oct 18, 2018Updated 7 years ago
- ☆12Mar 19, 2023Updated 3 years ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆75Dec 7, 2023Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- HAProxy configuration and lua scripts implementing a challenge-response page where visitors solve a captcha and/or proof-of-work (cpu int…☆15Feb 23, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆11Apr 22, 2022Updated 4 years ago
- Offshore.CAT provides DMCA-ignored offshore hosting solutions. Built with HTML and CSS, it offers an intuitive interface for seamless int…☆19Sep 9, 2025Updated 7 months ago
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆22May 11, 2024Updated last year
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- Azure AD Identity Protection Cookie Spoofing☆36Sep 2, 2023Updated 2 years ago
- Oyedata is a tool to perform OData assessments☆13Aug 3, 2012Updated 13 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated last year
- An example project for sauron web framework, showcasing animation transition☆14Mar 10, 2022Updated 4 years ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Apr 30, 2021Updated 5 years ago
- Yet another shellcode loader - but a sneaky one☆26Apr 16, 2025Updated last year
- Curated list of public penetration testing reports released by several consulting firms☆12Aug 18, 2016Updated 9 years ago
- ☆14Nov 21, 2025Updated 5 months ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆41Jun 30, 2022Updated 3 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Users can submit orders to milady pool and have their orders only execute at optimal prices☆10Sep 17, 2024Updated last year
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Jul 21, 2024Updated last year
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- Phrack Crackme Challenges☆23Apr 24, 2025Updated last year
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 4 years ago
- ☆19Mar 7, 2026Updated last month