mRemoteNG Config File Decrypt
☆93Oct 29, 2022Updated 3 years ago
Alternatives and similar repositories for mremoteng-decrypt
Users that are interested in mremoteng-decrypt are comparing it to the libraries listed below
Sorting:
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆49May 29, 2015Updated 10 years ago
- Python script to decrypt passwords stored by mRemoteNG☆176Jul 6, 2023Updated 2 years ago
- My cyber security notes.☆14Feb 22, 2025Updated last year
- CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13☆65Oct 26, 2019Updated 6 years ago
- Enyx SNMP IPv6 Enumeration Tool☆106Jan 20, 2023Updated 3 years ago
- CVE-2019-16113 - bludit >= 3.9.2 RCE authenticate☆13Jun 5, 2020Updated 5 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,744Dec 18, 2021Updated 4 years ago
- This script will bruteforce the credential of tomcat manager or host-manager☆32Jun 24, 2020Updated 5 years ago
- https://rcoil.me/2019/09/%E3%80%90%E7%BC%96%E7%A8%8B%E3%80%91SharpDecryptPwd/ 的示例代码☆49Sep 30, 2020Updated 5 years ago
- Various code snippets☆281Feb 8, 2026Updated last month
- Automated mRemoteNG Decrypt Tool☆27Apr 14, 2024Updated last year
- CVE-2019-6340 POC Drupal rce☆12Feb 25, 2019Updated 7 years ago
- ☆18Nov 4, 2021Updated 4 years ago
- Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)☆162Jun 14, 2018Updated 7 years ago
- JAWS - Just Another Windows (Enum) Script☆1,930Apr 19, 2021Updated 4 years ago
- XSS平台 CTF工具 Web安全工具☆11Jun 3, 2018Updated 7 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Updating MS08-067 Python exploit script☆105Aug 18, 2018Updated 7 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- A little scanner to check the LDAP Signing state☆46Aug 2, 2021Updated 4 years ago
- ☆13Jan 3, 2021Updated 5 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,662Nov 28, 2020Updated 5 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆255Sep 30, 2022Updated 3 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆682May 9, 2019Updated 6 years ago
- Tools for Kerberos PKINIT and relaying to AD CS☆887Jan 3, 2025Updated last year
- The Python interface for YARA http://virustotal.github.io/yara/☆20Jul 13, 2017Updated 8 years ago
- may the poc with you☆17May 6, 2022Updated 3 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Dec 3, 2020Updated 5 years ago
- Monitor linux processes without root permissions☆5,927Mar 1, 2026Updated 3 weeks ago
- Own collection dictionary☆14Apr 20, 2020Updated 5 years ago
- Kerberos protocol attacker☆139Feb 1, 2021Updated 5 years ago
- PoC for CVE-2021-43557☆22Nov 22, 2021Updated 4 years ago
- A technique for Active Directory domain persistence☆39May 31, 2023Updated 2 years ago
- EoP POC for CVE-2019-1132☆61Sep 8, 2019Updated 6 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆341Jun 6, 2022Updated 3 years ago
- ODAT: Oracle Database Attacking Tool☆1,745Mar 9, 2026Updated last week
- Deserialization payload generator for a variety of .NET formatters☆3,691Dec 23, 2024Updated last year
- A Magento package containing a quick-and-dirty PHP shell.☆20Nov 12, 2014Updated 11 years ago
- ☆102Sep 14, 2022Updated 3 years ago