ka7ana / CVE-2023-23397Links
Simple PoC in PowerShell for CVE-2023-23397
☆40Updated 2 years ago
Alternatives and similar repositories for CVE-2023-23397
Users that are interested in CVE-2023-23397 are comparing it to the libraries listed below
Sorting:
- Cortex XDR Config Extractor☆133Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆112Updated last week
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- ☆119Updated 4 months ago
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆152Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆165Updated last year
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated last year
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- Collection of random RedTeam scripts.☆207Updated last year
- ☆123Updated last year
- Just some random Red Team Scripts that can be useful☆153Updated last year
- C2 Automation using Linode☆82Updated 2 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆202Updated 2 months ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆123Updated 5 years ago
- Easy red team phishing with Puppeteer☆131Updated 2 years ago
- ☆75Updated last week
- ☆95Updated 2 months ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Updated 3 years ago
- ☆105Updated last year
- ☆163Updated 9 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆176Updated 2 years ago
- ☆140Updated last year
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆120Updated 3 years ago
- ☆159Updated last year
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago