jamf / SMBGhost-SMBleed-scannerLinks
SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner
☆47Updated 5 years ago
Alternatives and similar repositories for SMBGhost-SMBleed-scanner
Users that are interested in SMBGhost-SMBleed-scanner are comparing it to the libraries listed below
Sorting:
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago
- Execute Mimikatz with different technique☆51Updated 4 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆82Updated 4 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 4 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆30Updated 6 years ago
- ☆50Updated 5 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- ☆19Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆31Updated 5 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41Updated 6 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Updated 6 years ago
- Linux x86_64 Process Injection Utility☆58Updated 4 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆19Updated 2 years ago
- Red Team C2 and Post Exploitation code☆36Updated 5 months ago
- DO NOT RUN THIS.☆47Updated 4 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆55Updated 6 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated 7 months ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 3 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 5 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 5 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆62Updated 6 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Updated 5 years ago
- adding a backdooruser using win32api☆80Updated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Updated 6 years ago
- ☆37Updated 5 years ago
- The program is designed to dump full memory of the process by specifing process name or process id.☆40Updated 6 years ago