kimusan / pkwnerLinks
A python3 and bash PoC for CVE-2021-4034 by Kim Schulz
☆21Updated 3 years ago
Alternatives and similar repositories for pkwner
Users that are interested in pkwner are comparing it to the libraries listed below
Sorting:
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆45Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Bad scripts I made doing CTF's☆21Updated last year
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12Updated 2 years ago
- ☆34Updated 3 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆44Updated 2 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆41Updated 3 years ago
- ☆22Updated 3 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated last year
- Crackmapexec custom scripts used in my internal pentests.☆24Updated last year
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆28Updated 2 years ago
- ☆38Updated last year
- ☆47Updated 3 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆91Updated last year
- rcat☆67Updated 3 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 4 months ago
- Automate converting webshells into reverse shells.☆69Updated 2 months ago
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆22Updated 3 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- A little cheatsheet for NetExec☆22Updated last year
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Updated 3 years ago
- Creates and sends fake meeting invite☆61Updated 4 years ago
- Windows Privilege Escalation☆64Updated 3 years ago
- python spraying tools based on impacket lib☆53Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆110Updated last year
- ☆31Updated 3 years ago