mhaskar / ExchangeFinder
Find Microsoft Exchange instance for a given domain and identify the exact version
☆187Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ExchangeFinder
- ☆95Updated 2 years ago
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆131Updated last year
- A script to dump files and folders remotely from a Windows SMB share.☆211Updated 4 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆166Updated last year
- Set of python scripts which perform different ways of command execution via WMI protocol.☆158Updated last year
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆124Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆265Updated last week
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆135Updated last year
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆78Updated 5 months ago
- Impacket is a collection of Python classes for working with network protocols.☆67Updated 3 months ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆225Updated last year
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆60Updated 2 years ago
- ☆112Updated last year
- ☆143Updated 8 months ago
- ☆118Updated last year
- PrintNightmare (CVE-2021-34527) PoC Exploit☆106Updated last year
- AD ACL abuse☆260Updated 4 months ago
- Powershell version of SharpGPOAbuse☆70Updated 3 years ago
- Cortex XDR Config Extractor☆119Updated last year
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆79Updated 11 months ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆189Updated 4 months ago
- ☆160Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆36Updated last year
- ☆241Updated last year
- Shellcode launcher for AV bypass☆215Updated 10 months ago
- Windows Privilege Escalation☆43Updated 2 years ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆180Updated 3 months ago
- ACL abuse swiss-knife☆117Updated last year
- Use ESC1 to perform a makeshift DCSync and dump hashes☆198Updated last year