isclayton / viewstalker
A tool for identifying and exploiting vulnerable Viewstate implementations in ASP.NET
☆33Updated 2 years ago
Alternatives and similar repositories for viewstalker
Users that are interested in viewstalker are comparing it to the libraries listed below
Sorting:
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Updated 4 years ago
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆20Updated 11 months ago
- Active Directory certificate abuse.☆38Updated 3 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆62Updated 2 years ago
- ☆71Updated last year
- ☆52Updated 3 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆59Updated 2 years ago
- Beacon Object Files.☆35Updated last year
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆63Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆82Updated 2 years ago
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆54Updated last year
- Exploit for Microsoft SharePoint 2019☆13Updated last year
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 7 months ago
- Ivanti EPM AgentPortal RCE Vulnerability☆21Updated 8 months ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆51Updated 3 years ago
- zimbra "zmslapd" lpe☆21Updated 3 years ago
- Winsocket for Cobalt Strike.☆98Updated last year
- ☆18Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆39Updated 3 years ago
- Titan: A generic user defined reflective DLL for Cobalt Strike☆75Updated 2 years ago
- Office 365 and Exchange Enumeration Version 2☆18Updated last year
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- CVE-2024-40711-exp☆41Updated 7 months ago
- Groovy Post Exploitation☆20Updated 6 months ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆52Updated 8 months ago
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆35Updated 4 years ago
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆24Updated 2 years ago
- Secretsdump C# version only supporting local (live) operation☆49Updated 3 weeks ago