coldfusion39 / domi-ownedView external linksLinks
IBM/Lotus Domino exploitation
☆120Jul 10, 2020Updated 5 years ago
Alternatives and similar repositories for domi-owned
Users that are interested in domi-owned are comparing it to the libraries listed below
Sorting:
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Oct 4, 2019Updated 6 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 13 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- Installs And Executes Shellcode☆11Jul 26, 2015Updated 10 years ago
- A utility to perform dictionary attacks against the VoIP SIP Register hash☆14Mar 16, 2016Updated 9 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Windows Share Enumerator☆130Nov 1, 2018Updated 7 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- A scanner for SIP proxies vulnerable to Shellshock☆112Aug 13, 2016Updated 9 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Sep 21, 2020Updated 5 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆322Jun 5, 2017Updated 8 years ago
- .NET tool for enumeration processes and dumping memory.☆57Apr 4, 2019Updated 6 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,111Nov 3, 2017Updated 8 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- See here:☆43Dec 6, 2012Updated 13 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆70Jul 26, 2018Updated 7 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Apr 20, 2020Updated 5 years ago
- SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt…☆196Jun 30, 2019Updated 6 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆214Aug 4, 2020Updated 5 years ago
- XXE attack tool☆31Feb 20, 2016Updated 9 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- ☆301Nov 9, 2020Updated 5 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- A phone CNAM lookup utility using the OpenCNAM API☆12Aug 15, 2014Updated 11 years ago
- ☆58Nov 27, 2014Updated 11 years ago
- Flash XSS Scanner☆54Jun 26, 2016Updated 9 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆199Nov 19, 2017Updated 8 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆177Sep 18, 2018Updated 7 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago