kimusan / pkwner
A python3 and bash PoC for CVE-2021-4034 by Kim Schulz
☆21Updated 3 years ago
Alternatives and similar repositories for pkwner:
Users that are interested in pkwner are comparing it to the libraries listed below
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆41Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- ☆33Updated 2 years ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆21Updated 3 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆13Updated last year
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 2 years ago
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- Windows Privilege Escalation☆56Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆45Updated last year
- InfluxDB CVE-2019-20933 vulnerability exploit☆39Updated 3 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆26Updated 6 years ago
- Check robustness of your (their) Active Directory accounts passwords☆34Updated 3 weeks ago
- Creates and sends fake meeting invite☆58Updated 3 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆61Updated 3 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 2 months ago
- HP Data Protector Arbitrary Remote Command Execution☆11Updated 6 years ago
- A little cheatsheet for NetExec☆22Updated 10 months ago
- Exploit to dump ipmi hashes☆32Updated last year
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆84Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆21Updated 2 months ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆70Updated last year
- A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell option…☆14Updated last year
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Get a reverse shell using PostgreSQL☆17Updated 7 months ago
- ☆38Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆111Updated last year