mhaskar / ExchangeFinderLinks
Find Microsoft Exchange instance for a given domain and identify the exact version
☆184Updated 2 years ago
Alternatives and similar repositories for ExchangeFinder
Users that are interested in ExchangeFinder are comparing it to the libraries listed below
Sorting:
- ☆99Updated 3 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆96Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆177Updated 2 years ago
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- A python script to dump files and folders remotely from a Windows SMB share.☆224Updated 4 months ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆138Updated 2 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆146Updated last year
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆72Updated 9 months ago
- Automated exploitation of MSSQL servers at scale☆108Updated 2 weeks ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆83Updated 3 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆129Updated last year
- Use ESC1 to perform a makeshift DCSync and dump hashes☆209Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆306Updated 6 months ago
- OPSEC safe Kerberoasting in C#☆192Updated 2 years ago
- ☆159Updated 6 months ago
- MS-FSRVP coercion abuse PoC☆291Updated 3 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆72Updated 3 years ago
- ACL abuse swiss-knife☆123Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆91Updated last year
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆197Updated 11 months ago
- Powershell version of SharpGPOAbuse☆78Updated 4 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆257Updated 2 years ago
- Shellcode launcher for AV bypass☆215Updated last year
- Cortex XDR Config Extractor☆132Updated 2 years ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 3 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆239Updated last year
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆202Updated 4 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆45Updated 2 years ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆129Updated last year