ly4k / SMBGhostLinks
Scanner for CVE-2020-0796 - SMBv3 RCE
☆694Updated 4 years ago
Alternatives and similar repositories for SMBGhost
Users that are interested in SMBGhost are comparing it to the libraries listed below
Sorting:
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,330Updated 4 years ago
- PoC for triggering buffer overflow via CVE-2020-0796☆329Updated 2 years ago
- ☆1,359Updated 5 years ago
- PoC for Zerologon - all research credits go to Tom Tervoort of Secura☆1,255Updated 4 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆751Updated 4 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆751Updated 9 years ago
- CVE-2020-0796 Remote Code Execution POC☆564Updated 5 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- Exploit for zerologon cve-2020-1472☆668Updated 4 years ago
- Proof of concept for CVE-2019-0708☆1,181Updated 3 years ago
- dump☆494Updated 6 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆923Updated 5 years ago
- HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Se…☆280Updated 4 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆549Updated 5 years ago
- The great impacket example scripts compiled for Windows☆981Updated 6 years ago
- Exploit Code for CVE-2020-1472 aka Zerologon☆384Updated 4 years ago
- A collection of pentest and development tips☆1,122Updated 3 years ago
- PowerShell ReverseTCP Shell - Framework☆1,057Updated 2 years ago
- Support ALL Windows Version☆720Updated 5 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,519Updated 2 years ago
- A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating sys…☆491Updated 5 years ago
- ☆473Updated 2 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆350Updated 5 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,009Updated 7 years ago
- CVE-2020-5902 BIG-IP☆373Updated 3 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Updated 4 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆956Updated 7 years ago
- Some useful scripts for CobaltStrike☆851Updated 4 years ago
- RottenPotato local privilege escalation from service account to SYSTEM☆688Updated 7 years ago
- Proof of Concepts☆1,267Updated 10 months ago