dmaasland / exchange-proxylogonLinks
☆19Updated 4 years ago
Alternatives and similar repositories for exchange-proxylogon
Users that are interested in exchange-proxylogon are comparing it to the libraries listed below
Sorting:
- .NET 4.0 Fast Directory / File Lister☆26Updated 4 years ago
- SharpDir is a simple code set to search both local and remote file systems for files and is compatible with Cobalt Strike.☆27Updated 5 years ago
- Alternative Mimikatz LSASS DUMPER☆12Updated 5 years ago
- C# wrapper for ligolo☆16Updated 3 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Updated 4 years ago
- C# port of LogServiceCrash☆46Updated 4 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆26Updated 4 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Updated 3 years ago
- A little scanner to check the LDAP Signing state☆46Updated 3 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Updated 3 years ago
- CVE-2019-1040 with Kerberos delegation☆34Updated 4 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Updated 4 years ago
- A repo to hold any bypasses I work on/study/whatever☆19Updated 4 years ago
- treafik fronted c2 examples☆26Updated 4 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆35Updated 4 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Updated 5 years ago
- This is a patched version of ExchangeRelayX☆14Updated 4 years ago
- Leak windows system info through a docx file☆12Updated 5 years ago
- ☆19Updated 4 years ago
- ☆37Updated 7 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆37Updated 6 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 5 years ago
- CVE-2020-3452 exploit☆24Updated 4 years ago
- I used this to see if an EDR is running in Safe Mode☆37Updated 4 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆45Updated 4 years ago
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Updated last year
- Helper script for mangling CS payloads☆51Updated 6 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Updated 4 years ago