mekhalleh / cve-2019-0708
Metasploit module for massive Denial of Service using #Bluekeep vector.
☆25Updated 5 years ago
Alternatives and similar repositories for cve-2019-0708:
Users that are interested in cve-2019-0708 are comparing it to the libraries listed below
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated last year
- Sound Research SECOMN service Privilege Escalation (windows 10)☆40Updated 5 years ago
- ☆38Updated 5 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 4 years ago
- Passwordless RDP Session Hijacking☆66Updated 3 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆35Updated 5 years ago
- CVE-2020-1048 bypass: binary planting PoC☆32Updated 4 years ago
- Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.☆39Updated 3 years ago
- PoC CVE-2020-6308☆34Updated 4 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated 4 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆26Updated 4 years ago
- Linux x86_64 Process Injection Utility☆59Updated 4 years ago
- Apache Module Backdoor (PoC)☆48Updated 5 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆24Updated 5 years ago
- Powershell SMBv3 Compression checker☆28Updated 2 years ago
- Basic password spraying tool for internal tests and red teaming☆90Updated 5 years ago
- gui uac bypass (netplwiz.exe)☆66Updated 5 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆37Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆19Updated 6 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆91Updated 3 years ago
- ☆19Updated 4 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Updated 4 years ago
- AutoStart teamserver and listeners with services☆73Updated 3 years ago
- ☆70Updated 4 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 4 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆19Updated 4 years ago