deetl / CVE-2023-24055Links
POC and Scanner for CVE-2023-24055
☆65Updated 2 years ago
Alternatives and similar repositories for CVE-2023-24055
Users that are interested in CVE-2023-24055 are comparing it to the libraries listed below
Sorting:
- PrintNightmare (CVE-2021-34527) PoC Exploit☆110Updated 2 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆64Updated 2 years ago
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- ☆123Updated last year
- C2 Automation using Linode☆82Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆108Updated last week
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆27Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 5 months ago
- ☆93Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆185Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 2 years ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 3 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆92Updated last year
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆80Updated 2 years ago
- ACL abuse swiss-knife☆124Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- ☆118Updated 2 months ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- PowerShell Reverse Shell☆78Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆46Updated 2 years ago
- InfoSec Notes☆56Updated last year
- ☆99Updated 3 years ago
- ☆22Updated 3 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated last year
- ☆234Updated 7 months ago
- ☆92Updated 2 years ago