kmahyyg / mremoteng-decrypt
mRemoteNG Config File Decrypt
☆79Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for mremoteng-decrypt
- SNMP data gather scripts☆77Updated 8 months ago
- Scripts created to help with post exploitation of a Windows host☆95Updated 3 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆59Updated 5 years ago
- Changes for Visual Studio 2013☆114Updated 9 years ago
- Jackson Rce For CVE-2019-12384☆97Updated 5 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆73Updated 3 years ago
- Collection of username lists for enumerating kerberos domain users☆80Updated 6 years ago
- Office 365 and Exchange Enumeration☆181Updated 5 years ago
- Updating MS08-067 Python exploit script☆104Updated 6 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆163Updated 2 years ago
- ☆43Updated 7 years ago
- CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13☆58Updated 5 years ago
- RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer☆54Updated 4 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆44Updated 9 years ago
- Just some exploits :P☆46Updated 3 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆210Updated 4 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆79Updated 3 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆197Updated 6 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆215Updated 4 years ago
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆176Updated 2 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆172Updated 4 years ago
- Shell Simulation over Net-SNMP with extend functionality☆88Updated 3 years ago
- ☆189Updated 4 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆138Updated 3 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Updated 3 years ago
- Example Vulnerable .NET HTTP Remoting☆75Updated 5 years ago
- A super small jsp webshell with file upload capabilities.☆289Updated 3 years ago
- Here you can get full exploit for SAP NetWeaver AS JAVA☆74Updated 6 years ago
- ☆127Updated 6 years ago
- https://github.com/timip/OSWE☆18Updated 4 years ago