lazaars / UltraRealy_with_CVE-2019-1040
Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit
☆20Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for UltraRealy_with_CVE-2019-1040
- AppLocker Bypass With Regasm/InstallUtil☆23Updated 5 years ago
- BlowBeef is a tool for analyzing WMI data.☆18Updated 3 years ago
- couchdb remote command exec.☆14Updated 6 years ago
- Show AV Processes list☆14Updated 4 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆13Updated 5 years ago
- Antivirus Process List☆15Updated 5 years ago
- Aggressor Script to launch IE driveby for CVE-2018-15982.☆28Updated 4 years ago
- ☆36Updated 4 years ago
- cobalt strike 自用脚本☆27Updated 4 years ago
- Windows 7/2008 R2 EoP☆13Updated 3 years ago
- Use current thread token to execute command☆15Updated 3 years ago
- inject shellcode into remote process via message hook☆15Updated 4 years ago
- PhishReportCS is a penetration testing and red teaming tool that automates the phishing campaign reporting process for Cobalt Strike phis…☆8Updated 5 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆10Updated 4 years ago
- C# 编写的用于 Dropbox 文件上传☆20Updated 2 years ago
- CVE-2019-1040 with Kerberos delegation☆32Updated 3 years ago
- AggressorScript-RunDumpHash☆19Updated 5 years ago
- 攻击Java Web应用-[Java Web安全]☆15Updated 3 years ago
- beacon,aggressor-scripts,cna,cobalt-strike,email☆36Updated 5 years ago
- SharpAddDomainMachine☆67Updated 3 years ago