claroty / PCOM-Tools
☆14Updated 8 months ago
Alternatives and similar repositories for PCOM-Tools:
Users that are interested in PCOM-Tools are comparing it to the libraries listed below
- RCE PoC for Empire C2 framework <5.9.3☆26Updated last year
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- ☆34Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 8 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆28Updated 3 weeks ago
- exfiltration/infiltration toolkit☆23Updated last year
- This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-2…☆30Updated last year
- ☆16Updated 4 months ago
- Repo for all my exploits/PoCs☆50Updated 2 months ago
- ☆55Updated 5 months ago
- A user enumeration tool for Slack.☆28Updated 10 months ago
- Top 400 passwords as per HaveIBeenPwned☆22Updated 6 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 9 months ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆27Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated 10 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 7 months ago
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 6 months ago
- Make an Linux Kernel rootkit visible again.☆50Updated last month
- ☆32Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆39Updated last year
- ☆52Updated last year
- Exploits Unauth Docker API☆25Updated last week
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- ☆13Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆47Updated last month
- ☆34Updated 7 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- Covert data exfiltration via DNS☆43Updated 2 months ago