gmh5225 / CVE-2022-44721-CsFalconUninstaller
☆23Updated 2 years ago
Alternatives and similar repositories for CVE-2022-44721-CsFalconUninstaller:
Users that are interested in CVE-2022-44721-CsFalconUninstaller are comparing it to the libraries listed below
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆35Updated 3 years ago
- AutoPoC Generator HoneyPoC☆35Updated 7 months ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated 4 months ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆42Updated 3 years ago
- Discord C2 Profile for Mythic☆26Updated this week
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 10 months ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆17Updated 10 months ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆40Updated 3 years ago
- ☆17Updated 5 years ago
- ☆30Updated 2 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 2 years ago
- PoC-Malware-TTPs☆49Updated last year
- IOXIDResolver from AirBus Security/PingCastle☆47Updated 4 years ago
- ☆24Updated 3 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆48Updated 2 years ago
- ☆13Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆54Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- ☆36Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- My BloodHound custom queries☆23Updated 2 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year