executeatwill / ova-to-dockerLinks
This tool converts OVA (Open Virtual Appliance) or VMDK (Virtual Machine Disk) files to Docker container format.
☆23Updated 4 months ago
Alternatives and similar repositories for ova-to-docker
Users that are interested in ova-to-docker are comparing it to the libraries listed below
Sorting:
- C2 redirector as a web API☆10Updated 4 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆115Updated 2 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆111Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Updated 3 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Updated 4 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆71Updated 2 years ago
- Single executable reverse SOCKS5 proxy written in Golang.☆148Updated 3 months ago
- A python script to extract information from a Microsoft Remote Desktop Web Access (RDWA) application☆112Updated last month
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Updated 3 years ago
- ☆129Updated 2 years ago
- Decrypt mRemoteNG passwords☆65Updated 3 years ago
- This cheatsheet contains Active Directory (AD) exploitation techniques, showcasing methods used to identify and abuse misconfigurations o…☆54Updated 2 years ago
- ☆94Updated 2 years ago
- Simple HTTP async comms using standard GET/POST requests☆46Updated last week
- PowerShell SOCKS proxy with reverse proxy capabilities☆83Updated 4 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆41Updated 4 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆21Updated 5 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆130Updated 4 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Updated 3 years ago
- Automating payload generation for OSEP labs and exam.☆34Updated 3 years ago
- ACL abuse swiss-knife☆127Updated 3 years ago
- My implementation of the GIUDA project in C++☆189Updated 2 years ago
- Azure AD Password Checker☆86Updated last year
- Active Directory certificate abuse.☆38Updated 4 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆33Updated 4 years ago
- ☆57Updated last year
- ☆55Updated 3 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆162Updated 4 years ago
- ☆59Updated 4 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆100Updated 4 years ago