cnotin / SplunkWhisperer2Links
Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations
☆255Updated 3 years ago
Alternatives and similar repositories for SplunkWhisperer2
Users that are interested in SplunkWhisperer2 are comparing it to the libraries listed below
Sorting:
- Changes for Visual Studio 2013☆118Updated 10 years ago
- Weaponizing Splunk with reverse and bind shells.☆182Updated 8 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆145Updated 4 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆284Updated 2 years ago
- Disposable and resilient red team infrastructure with Terraform☆279Updated 6 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆205Updated 2 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆181Updated 2 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆78Updated 4 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆500Updated 2 months ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆86Updated 4 years ago
- Powershell crazy and sometimes diabolic scripts☆160Updated 5 years ago
- A Linux enumeration script for Hack The Box☆191Updated 6 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆236Updated 5 years ago
- 👹☆57Updated 4 years ago
- An script to perform kerberos bruteforcing by using impacket☆455Updated 3 years ago
- ☆524Updated 3 years ago
- Kerberoast attack -pure python-☆436Updated 2 years ago
- MS17-010☆272Updated 3 years ago
- Windows Kernel Exploits☆69Updated 8 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆231Updated 5 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆250Updated 8 years ago
- Collection of things made during my OSCP journey☆267Updated 7 years ago
- Active Directory Lab for Penetration Testing☆52Updated 4 months ago
- These are exploits created to avoid the use of Metasploit. While studying for OSCP in the Offsec labs, VHL, Vulnhub, etc, I tried to find…☆31Updated 4 months ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆384Updated 4 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆340Updated 7 years ago
- ☆104Updated 6 years ago
- ☆333Updated 2 years ago
- Active Directory ACL exploitation with BloodHound☆749Updated 4 years ago
- ☆157Updated 2 months ago