herwonowr / exprolog
ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)
☆174Updated 3 years ago
Alternatives and similar repositories for exprolog:
Users that are interested in exprolog are comparing it to the libraries listed below
- ProxyLogon(CVE-2021-26855+CVE-2021-27065) Exchange Server RCE(SSRF->GetWebShell)☆121Updated 3 years ago
- [ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains.…☆174Updated 2 years ago
- NTLM relay test.☆188Updated last year
- A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX/vCenter/NSX/Horizon/vRealize Operations M…☆204Updated 3 years ago
- Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-softw…☆280Updated last year
- Some Attacks of Exchange SSRF ProxyLogon&ProxyShell☆167Updated 3 years ago
- Cobalt Strike AggressorScripts For Red Team☆154Updated 3 years ago
- PoC for CVE-2021-4034☆62Updated 3 years ago
- vhost password decrypt☆239Updated 3 months ago
- Memshell☆270Updated 3 years ago
- red-tldr is a lightweight text search tool, which is used to help red team staff quickly find the commands and key points they want to ex…☆233Updated 2 years ago
- Modifying JuicyPotato to support load shellcode and webshell☆190Updated 3 years ago
- Yet another SharpSphere☆222Updated 3 years ago
- 利用NTLM Hash读取Exchange邮件☆423Updated 3 weeks ago
- ☆231Updated last year
- A simple python script to generate XML payloads works for XMLDecoder based on ProcessBuilder and Runtime exec☆149Updated 4 years ago
- 获取Exchange信息的小工具☆224Updated last year
- CrossC2 developed based on the Cobalt Strike framework can be used for other cross-platform system control. CrossC2Kit provides some inte…☆213Updated last year
- 提取DC日志,快速获取域用户对应IP地址☆299Updated 2 years ago
- RedTeam参考,修改自Ridter的https://github.com/Ridter/Intranet_Penetration_Tips☆89Updated 3 years ago
- 获取服务器或域控登录日志☆273Updated last year
- 通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化☆332Updated 2 years ago
- Bypass AV 用户添加☆167Updated 3 years ago
- Burp插件,Malleable C2 Profiles生成器;可以通过Burp代理选中请求,生成Cobalt Strike的profile文件(CSprofile)☆276Updated 3 years ago
- cve-2022-23131 exp☆94Updated 2 years ago
- WarSQLKit is a fileless rootkit and attack tool I developed for MS-SQL. With this tool you can rootkit the SQL service that uses CLR on M…☆250Updated last year
- This is a easy tool for gen VBA code, and bypass most antivirus☆59Updated 3 years ago
- 域渗透工具☆133Updated 5 years ago
- cve-2022-23131 zabbix-saml-bypass-exp☆151Updated 5 months ago
- POC for RCE using vulnerabilities described in VMSA-2023-0001☆151Updated last year