deadjakk / patch-checker
Web-based check for Windows privesc vulnerabilities
☆139Updated last year
Alternatives and similar repositories for patch-checker:
Users that are interested in patch-checker are comparing it to the libraries listed below
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆174Updated 4 years ago
- This Repository contains the stuff related to windows Active directory environment exploitation☆148Updated last year
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆201Updated last year
- An Insider Threat Toolkit☆150Updated 6 years ago
- Parse NTLM challenge messages over HTTP and SMB☆144Updated 2 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆203Updated 4 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 4 years ago
- ☆190Updated 5 years ago
- ☆162Updated 2 years ago
- Samba, NFS shares spider and grepper☆71Updated 6 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- A tool to create obfuscated HTA script.☆176Updated 3 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆216Updated 5 years ago
- ☆168Updated 5 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆92Updated 2 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆177Updated 2 years ago
- Used for the osce exam preparation☆74Updated 9 years ago
- Domain user enumeration tool☆215Updated last year
- ☆128Updated last year
- lateral movement techniques that can be used during red team exercises☆270Updated 5 years ago
- This is a PowerShell Empire launcher PoC using PrintDemon and Faxhell.☆200Updated 4 years ago
- Constrained Language Mode + AMSI bypass all in one☆157Updated 5 years ago
- CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13☆63Updated 5 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆257Updated 6 years ago
- ☆294Updated 4 years ago
- Some exploits, which I’ve created during my OSCE preparation.☆82Updated 6 years ago
- SonicWall SSL-VPN Exploit☆176Updated 4 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆80Updated 3 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆62Updated 6 years ago