michaelpoznecki / zerologon
Scan for and exploit the zerologon vulnerability.
☆10Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for zerologon
- Convert ldapdomaindump to Bloodhound☆77Updated 11 months ago
- Secretsdump C# version only supporting local (live) operation☆47Updated last year
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- This repository presents a proof-of-concept of CVE-2023-22527☆13Updated 9 months ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆11Updated 8 months ago
- Open-Source Phishing Toolkit☆17Updated 3 years ago
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆11Updated 9 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 5 months ago
- Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960☆2Updated 2 years ago
- Template Nuclei SSTI☆29Updated last year
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆44Updated 3 months ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆59Updated 11 months ago
- CVE-2022-41040 nuclei template☆18Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- Tool for MSSQL relay audit and abuse☆33Updated 8 months ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆30Updated 2 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with a previous run, to detect potential backdoor/excessive persistent permission(s)☆14Updated 11 months ago
- ☆46Updated last year
- ☆51Updated last year
- Ivanti EPM SQL Injection Remote Code Execution Vulnerability☆20Updated 5 months ago
- Office 365 and Exchange Enumeration Version 2☆18Updated 9 months ago
- ☆42Updated 2 years ago
- tool that generates bypasses for open redirects☆48Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆79Updated 11 months ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆49Updated 3 years ago
- Proof of Concept Exploit for CVE-2024-9465☆25Updated last month