hackerhouse-opensource / telnetclientpocLinks
Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit
☆57Updated 4 months ago
Alternatives and similar repositories for telnetclientpoc
Users that are interested in telnetclientpoc are comparing it to the libraries listed below
Sorting:
- ☆79Updated 4 months ago
- Lateral Movement☆124Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆99Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆97Updated 4 months ago
- ☆146Updated 4 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆72Updated last year
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆83Updated last week
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆76Updated 3 weeks ago
- Tool to extract username and password of current user from PanGPA in plaintext☆87Updated 8 months ago
- ☆59Updated 10 months ago
- Decrypt GlobalProtect configuration and cookie files.☆150Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- ☆192Updated 5 months ago
- Active Directory Authentication Library☆80Updated 3 weeks ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆83Updated last year
- ☆109Updated 6 months ago
- ☆161Updated last year
- Advanced In-Memory PowerShell Process Injection Framework☆68Updated last month
- Convert your shellcode into an ASCII string☆114Updated 2 months ago
- ☆90Updated last year
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆140Updated last month
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆79Updated 6 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆176Updated 3 months ago
- Python tool to interact with WMI StdRegProv☆60Updated 9 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- Deploy a phishing infrastructure on the fly.☆75Updated 8 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆149Updated 7 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆59Updated 2 months ago