dinosn / proxyshellLinks
A basic proxylogon scanner
☆27Updated 4 years ago
Alternatives and similar repositories for proxyshell
Users that are interested in proxyshell are comparing it to the libraries listed below
Sorting:
- ☆19Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- Default plugins for Jaeles Scanner☆35Updated 5 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Updated 5 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Nmap script to check vulnerability CVE-2021-21972☆27Updated 4 years ago
- DO NOT RUN THIS.☆47Updated 4 years ago
- client-side prototype pullution vulnerability scanner☆46Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆58Updated 2 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆31Updated 5 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Magento Security Scanner☆13Updated 4 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 5 years ago
- Stealthy Stand Alone PHP Web Shell☆33Updated 6 years ago
- XMLRPC - RCE in MovableTypePoC☆21Updated 3 years ago
- ☆36Updated last year
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆27Updated 5 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 5 years ago
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Updated 4 years ago
- ☆26Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Updated 4 years ago
- Guide For WAF Bypass Techniques☆28Updated 5 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Execute Mimikatz with different technique☆51Updated 4 years ago