Tool to communicate with RPC services and check misconfigurations on NFS shares
☆63Sep 27, 2019Updated 6 years ago
Alternatives and similar repositories for RPCScan
Users that are interested in RPCScan are comparing it to the libraries listed below
Sorting:
- VNC pentest tool with bruteforce and ducky script execution features☆24Nov 18, 2017Updated 8 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- C# .NET Assembly for interacting with File Object DACLs☆45Apr 3, 2020Updated 5 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆70Jul 26, 2018Updated 7 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆29Jun 23, 2021Updated 4 years ago
- ☆37Feb 12, 2018Updated 8 years ago
- ☆28Mar 26, 2020Updated 5 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Jan 24, 2020Updated 6 years ago
- A small .NET compression utility☆58Feb 2, 2022Updated 4 years ago
- WMI Event Subscription Persistence in C#☆112May 29, 2019Updated 6 years ago
- c# implementation of Active Directory Integrated DNS dumping (authenticated user)☆205May 25, 2021Updated 4 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- ☆15Apr 20, 2020Updated 5 years ago
- C# PoC implementation for bypassing AMSI via in memory patching☆66Jul 20, 2020Updated 5 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- SharpAddDomainMachine☆69Oct 12, 2021Updated 4 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Nov 14, 2020Updated 5 years ago
- Powershell MS Outlook enumeration and phishing tool☆77May 26, 2016Updated 9 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆230Feb 20, 2020Updated 6 years ago
- Learn how to get a reverse shell from JIRA application server☆24Dec 2, 2018Updated 7 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- Powershell VNC injector☆341Jun 29, 2020Updated 5 years ago
- Abusing Exchange via EWS☆153Sep 14, 2020Updated 5 years ago
- A collection of writeups for active HTB boxes.☆11Nov 15, 2018Updated 7 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Port of Invoke-Excel4DCOM☆104Oct 12, 2019Updated 6 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- Create a minidump of the LSASS process from memory☆261Nov 2, 2022Updated 3 years ago
- SQL Server Management Studio(SSMS) saved password dumper☆117Jul 22, 2022Updated 3 years ago
- 一些漏洞的环境/利用工具/分析☆10Jul 24, 2020Updated 5 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago