A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell
☆15Sep 3, 2021Updated 4 years ago
Alternatives and similar repositories for exchange-scans
Users that are interested in exchange-scans are comparing it to the libraries listed below
Sorting:
- ☆24Jan 31, 2016Updated 10 years ago
- x86 Assembly Code Examples for Blog Posts☆18Aug 2, 2022Updated 3 years ago
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Apr 23, 2022Updated 3 years ago
- Reflective DLL self-loading as a library☆21May 3, 2025Updated 10 months ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- Azure AD Identity Protection Cookie Spoofing☆36Sep 2, 2023Updated 2 years ago
- ☆36Oct 1, 2024Updated last year
- Reasonably undetected shellcode stager and executer.☆36May 23, 2025Updated 9 months ago
- Numbeo Unofficial API☆15Oct 16, 2022Updated 3 years ago
- ☆14Nov 21, 2025Updated 3 months ago
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆37Feb 27, 2023Updated 3 years ago
- Inject shellcode into a valid BMP/GIF image.☆34Sep 7, 2020Updated 5 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Nov 14, 2017Updated 8 years ago
- A remapper for Touhou Project☆12Mar 24, 2023Updated 2 years ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 9 months ago
- ☆11Feb 9, 2026Updated 3 weeks ago
- Users can submit orders to milady pool and have their orders only execute at optimal prices☆10Sep 17, 2024Updated last year
- Offshore.CAT provides DMCA-ignored offshore hosting solutions. Built with HTML and CSS, it offers an intuitive interface for seamless int…☆18Sep 9, 2025Updated 5 months ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 8 months ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- Generate Software Bill of Materials (SBOM) from virtual machine disk images, without booting the VM.☆17Feb 20, 2026Updated last week
- A static code analyzer to generate network connection topology for micro-service applications☆18Feb 16, 2026Updated 2 weeks ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- [MIRROR] Templates and scripts to provide Windows and Linux machines with packer and vagrant☆10May 10, 2025Updated 9 months ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Kubernetes Master Class: A Seamless Approach to Rancher & Kubernetes Upgrades☆11May 30, 2022Updated 3 years ago
- A Firefox plugin that allows you to choose easily between different DNS over HTTPS servers☆12Apr 28, 2020Updated 5 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- A small stuff of telegram bot for pentest and information gathering.☆11Oct 3, 2020Updated 5 years ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆50Feb 29, 2024Updated 2 years ago
- Using a Google a Programmable Search Engine to make custom Digital Business Card Search Engine☆10Oct 4, 2022Updated 3 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago