kimusan / pkwnerLinks
A python3 and bash PoC for CVE-2021-4034 by Kim Schulz
☆21Updated 3 years ago
Alternatives and similar repositories for pkwner
Users that are interested in pkwner are comparing it to the libraries listed below
Sorting:
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆46Updated 2 years ago
- Exploit to dump ipmi hashes☆35Updated 2 years ago
- ☆34Updated 3 years ago
- Bad scripts I made doing CTF's☆21Updated last year
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- OpenNetAdmin 18.1.1 - Remote Code Execution☆30Updated 5 years ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆41Updated 3 years ago
- Windows Privilege Escalation☆66Updated 3 years ago
- A post-exploitation tool to decrypt SolarPutty's sessions files☆36Updated 2 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆69Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated last year
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆42Updated 4 years ago
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆22Updated 3 years ago
- Creates and sends fake meeting invite☆66Updated 4 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆112Updated 2 years ago
- Collection of username lists for enumerating kerberos domain users☆94Updated 7 years ago
- Shell Simulation over Net-SNMP with extend functionality☆96Updated 4 years ago
- Automate converting webshells into reverse shells.☆69Updated 3 weeks ago
- Command line client for HackTheBox☆22Updated last year
- Rewriting SIET to python3☆50Updated 9 months ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆90Updated 2 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 4 years ago
- ☆47Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Script to retrieve the master password of a keepass database <= 2.53.1☆105Updated last year
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- CLI monitor for windows process- & file activity☆88Updated 4 years ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆28Updated 2 years ago