michaelpoznecki / zerologonLinks
Scan for and exploit the zerologon vulnerability.
☆10Updated 4 years ago
Alternatives and similar repositories for zerologon
Users that are interested in zerologon are comparing it to the libraries listed below
Sorting:
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆57Updated this week
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- ☆50Updated 2 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆21Updated 3 months ago
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆54Updated 3 years ago
- Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960☆2Updated 3 years ago
- Active Directory ACL exploitation with BloodHound☆12Updated 4 years ago
- Secretsdump C# version only supporting local (live) operation☆49Updated last month
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- Template Nuclei SSTI☆29Updated last year
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆53Updated 9 months ago
- ☆48Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆91Updated last year
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Updated last month
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 9 months ago
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 7 months ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Updated 5 months ago
- Exploit for Microsoft SharePoint 2019☆13Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆56Updated 3 years ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆23Updated 5 months ago
- Ivanti EPM SQL Injection Remote Code Execution Vulnerability☆22Updated 11 months ago
- Tool for efficient directory enumeration☆56Updated 7 months ago