deadjakk / patch-checker
Web-based check for Windows privesc vulnerabilities
☆138Updated last year
Related projects: ⓘ
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆171Updated 4 years ago
- This Repository contains the stuff related to windows Active directory environment exploitation☆145Updated last year
- Parse NTLM challenge messages over HTTP and SMB☆140Updated last year
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆176Updated last year
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆79Updated 3 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆208Updated 4 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆200Updated 3 years ago
- An Insider Threat Toolkit☆149Updated 5 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆136Updated 4 years ago
- ☆189Updated 4 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆197Updated last year
- Powershell script for enumerating vulnerable DCOM Applications☆250Updated 5 years ago
- This is a PowerShell Empire launcher PoC using PrintDemon and Faxhell.☆197Updated 3 years ago
- Collection of Windows Hacking Binaries☆48Updated 9 years ago
- Various Aggressor Scripts I've Created.☆146Updated 2 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆92Updated 2 years ago
- Domain user enumeration tool☆212Updated 10 months ago
- ☆128Updated last year
- Office 365 and Exchange Enumeration☆176Updated 5 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 3 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆59Updated 5 years ago
- A tool to create obfuscated HTA script.☆173Updated 3 years ago
- ☆165Updated 4 years ago
- ☆161Updated last year
- Presentation material presented by Outflank team members at public events.☆177Updated 3 months ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆105Updated 4 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆104Updated 4 years ago
- Some .ps1 scripts for pentesting☆131Updated 3 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆89Updated 2 weeks ago
- Powershell function to pull the local admin passwords from LDAP, stored there by LAPS.☆114Updated 4 years ago