ioncodes / SMBGhostLinks
Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE
☆57Updated 5 years ago
Alternatives and similar repositories for SMBGhost
Users that are interested in SMBGhost are comparing it to the libraries listed below
Sorting:
- with metasploit☆63Updated 5 years ago
- eternalrelayx☆36Updated 6 years ago
- ☆128Updated 2 years ago
- Ex-pv8's☆64Updated 6 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- ☆94Updated 6 years ago
- Some personal exploits/pocs☆54Updated 5 years ago
- ☆52Updated 5 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆53Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- ☆94Updated 6 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆54Updated 6 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Updated 2 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆72Updated last month
- Some minor changes to Chimichurri to get it to compile on modern machines☆44Updated 10 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- ☆50Updated 5 years ago
- ☆25Updated 5 years ago
- Python api for usage with cobalt strike's External C2 specification☆63Updated 6 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆125Updated 6 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆33Updated 8 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Updated 6 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- ☆43Updated 6 years ago
- ☆44Updated 5 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 5 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Updated 3 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆138Updated 5 years ago