horizon3ai / CVE-2021-38647Links
Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)
☆233Updated 4 years ago
Alternatives and similar repositories for CVE-2021-38647
Users that are interested in CVE-2021-38647 are comparing it to the libraries listed below
Sorting:
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆281Updated 3 years ago
- ☆296Updated last year
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆212Updated 3 years ago
- scan for NTLM directories☆368Updated last month
- Office 365 and Exchange Enumeration☆190Updated 6 years ago
- Dumping LAPS from Python☆276Updated 2 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆233Updated 3 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆367Updated 4 years ago
- Shell Simulation over Net-SNMP with extend functionality☆98Updated 4 years ago
- ☆215Updated 2 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆303Updated 2 years ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 4 years ago
- ☆206Updated 4 years ago
- Source Code Management Attack Toolkit☆221Updated 2 years ago
- A robust Red Team proxy written in Go.☆162Updated 3 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆180Updated 2 years ago
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 3 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆219Updated 4 years ago
- ☆405Updated 3 months ago
- SonicWall SSL-VPN Exploit☆185Updated 4 years ago
- D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects☆210Updated 4 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆443Updated 2 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆236Updated 3 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆562Updated last month
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated last week
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆178Updated 2 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆177Updated 4 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration feature…☆299Updated 2 years ago