dinosn / proxyshellLinks
A basic proxylogon scanner
☆27Updated 4 years ago
Alternatives and similar repositories for proxyshell
Users that are interested in proxyshell are comparing it to the libraries listed below
Sorting:
- Nmap script to check vulnerability CVE-2021-21972☆27Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- Default plugins for Jaeles Scanner☆35Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Python Script for SAML2 Authentication Passwordspray☆42Updated 2 years ago
- ☆19Updated 5 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Exactly what it sounds like, which is something rad☆23Updated 3 years ago
- DO NOT RUN THIS.☆47Updated 4 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- ☆36Updated 11 months ago
- Magento Security Scanner☆13Updated 3 years ago
- client-side prototype pullution vulnerability scanner☆46Updated 4 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆31Updated 5 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆47Updated 5 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆58Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Updated 3 years ago
- ☆26Updated 3 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- Stealthy Stand Alone PHP Web Shell☆33Updated 6 years ago
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- Take domains on stdin and output them on stdout if they get resolved☆32Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Updated 4 years ago
- A little implant which SSH's back with a shell☆38Updated 3 years ago