horizon3ai / CVE-2021-38647
Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)
☆233Updated 3 years ago
Alternatives and similar repositories for CVE-2021-38647:
Users that are interested in CVE-2021-38647 are comparing it to the libraries listed below
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆272Updated 3 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆530Updated 2 years ago
- scan for NTLM directories☆353Updated 9 months ago
- ☆291Updated 9 months ago
- ☆214Updated 2 years ago
- Dumping LAPS from Python☆265Updated 2 years ago
- ☆512Updated 3 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆176Updated 2 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆353Updated 4 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆230Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- ☆206Updated 3 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆391Updated 2 months ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆437Updated last year
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆270Updated last year
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆279Updated 2 years ago
- Active Directory Labs/exams Review☆253Updated 4 years ago
- Office 365 and Exchange Enumeration☆184Updated 5 years ago
- MS-FSRVP coercion abuse PoC☆287Updated 3 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆298Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆228Updated 3 years ago
- Exploit to SYSTEM for CVE-2021-21551☆237Updated 3 years ago
- A robust Red Team proxy written in Go.☆159Updated 3 years ago
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 2 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆380Updated last week
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆208Updated 3 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆418Updated 2 months ago
- ☆446Updated 2 years ago
- Kerberoast with ACL abuse capabilities☆425Updated 3 months ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆216Updated 4 years ago