horizon3ai / CVE-2021-38647Links
Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)
☆234Updated 3 years ago
Alternatives and similar repositories for CVE-2021-38647
Users that are interested in CVE-2021-38647 are comparing it to the libraries listed below
Sorting:
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆277Updated 3 years ago
- ☆521Updated 3 years ago
- ☆293Updated 11 months ago
- scan for NTLM directories☆361Updated last week
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆542Updated 2 years ago
- Dumping LAPS from Python☆267Updated 2 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆363Updated 4 years ago
- A robust Red Team proxy written in Go.☆160Updated 3 years ago
- ☆408Updated 2 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆233Updated 2 years ago
- Convert shellcode into different formats!☆353Updated 2 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆440Updated last year
- ☆214Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆233Updated 3 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆302Updated last year
- Exploit to SYSTEM for CVE-2021-21551☆237Updated 4 years ago
- Office 365 and Exchange Enumeration☆186Updated 6 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆281Updated 2 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆178Updated 2 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆210Updated 3 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆286Updated last year
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆186Updated 3 years ago
- Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration feature…☆291Updated 2 years ago
- Hide your payload in DNS☆614Updated 2 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆422Updated 5 months ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- MS-FSRVP coercion abuse PoC☆291Updated 3 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆307Updated 3 years ago
- ADCS abuser☆288Updated 2 years ago
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆306Updated 2 years ago