fox-it / cve-2019-1040-scanner
☆293Updated 4 years ago
Alternatives and similar repositories for cve-2019-1040-scanner:
Users that are interested in cve-2019-1040-scanner are comparing it to the libraries listed below
- CVE-2018-8581☆371Updated 2 years ago
- ntlm relay attack to Exchange Web Services☆330Updated 7 years ago
- cve-2020-0688☆323Updated last year
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆302Updated 2 years ago
- Parse NTLM challenge messages over HTTP and SMB☆144Updated 2 years ago
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆144Updated 4 years ago
- Domain user enumeration tool☆215Updated last year
- A library for integrating communication channels with the Cobalt Strike External C2 server☆283Updated 7 years ago
- ☆235Updated 5 years ago
- CobaltStrike External C2 for Websockets☆194Updated 5 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆322Updated 5 years ago
- CVE-2018-13379☆253Updated 5 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆178Updated 6 months ago
- ☆186Updated 3 years ago
- Cobalt Strike Python API☆296Updated 3 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆198Updated 6 years ago
- ☆207Updated 6 years ago
- Cobalt Strike Aggressor Scripts☆139Updated 3 months ago
- NTDS.dit offline dumper with non-elevated☆215Updated 7 years ago
- Office 365 and Exchange Enumeration☆183Updated 5 years ago
- A super small jsp webshell with file upload capabilities.☆294Updated 3 years ago
- SQL Server Reporting Services(CVE-2020-0618)中的RCE☆198Updated 5 years ago
- Collection of Aggressor Scripts for Cobalt Strike☆171Updated 6 years ago
- Various Aggressor Scripts I've Created.☆148Updated 3 years ago
- ☆291Updated 7 months ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆217Updated 5 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆174Updated 4 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆201Updated last year
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆377Updated 5 years ago
- A collection of useful scripts for Cobalt Strike☆168Updated 6 months ago