horizon3ai / CVE-2021-38647Links
Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)
☆233Updated 4 years ago
Alternatives and similar repositories for CVE-2021-38647
Users that are interested in CVE-2021-38647 are comparing it to the libraries listed below
Sorting:
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆277Updated 4 years ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 4 years ago
- ☆297Updated last year
- scan for NTLM directories☆376Updated 5 months ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆372Updated 5 years ago
- Office 365 and Exchange Enumeration☆199Updated 6 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆181Updated 2 years ago
- A robust Red Team proxy written in Go.☆166Updated 4 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆214Updated 4 years ago
- ☆215Updated 3 years ago
- ☆205Updated 4 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆278Updated 3 years ago
- The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel☆208Updated 4 years ago
- Password Hunter in Active Directory☆198Updated 3 years ago
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 3 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆142Updated this week
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆448Updated 2 years ago
- SonicWall SSL-VPN Exploit☆183Updated 4 years ago
- Convert shellcode into different formats!☆357Updated 2 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆178Updated 3 years ago
- Source Code Management Attack Toolkit☆225Updated 3 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆232Updated 3 years ago
- Hide your payload in DNS☆618Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆151Updated 2 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆383Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆237Updated 3 years ago
- Dumping LAPS from Python☆281Updated 3 years ago
- ☆414Updated 3 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆218Updated 5 years ago
- ☆407Updated 7 months ago