deetl / CVE-2023-24055Links
POC and Scanner for CVE-2023-24055
☆65Updated 2 years ago
Alternatives and similar repositories for CVE-2023-24055
Users that are interested in CVE-2023-24055 are comparing it to the libraries listed below
Sorting:
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆112Updated 2 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆64Updated 2 years ago
- ☆123Updated last year
- ☆92Updated 2 years ago
- ☆109Updated 8 months ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 2 years ago
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆84Updated 2 years ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆80Updated 2 years ago
- C2 Automation using Linode☆82Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆92Updated last year
- ☆93Updated 2 years ago
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆27Updated 2 years ago
- ACL abuse swiss-knife☆125Updated 2 years ago
- A port scanner written purely in PowerShell.☆79Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆44Updated 3 years ago
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- PickleC2 is a post-exploitation and lateral movements framework☆95Updated 3 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆185Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 5 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Updated 2 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆46Updated 2 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 3 years ago
- PowerShell Reverse Shell☆78Updated 2 years ago
- ☆82Updated 11 months ago
- InfoSec Notes☆56Updated last year