mohemiv / dodgypassLinks
Golden collection of weak passwords
☆71Updated last year
Alternatives and similar repositories for dodgypass
Users that are interested in dodgypass are comparing it to the libraries listed below
Sorting:
- ☆55Updated 3 years ago
- ☆68Updated last year
- Authentication Bypass in GoAnywhere MFT☆65Updated 2 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- ☆89Updated 2 years ago
- .NET deserialization hunter☆81Updated last year
- Dump Windows SAM hashes☆42Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆115Updated 2 years ago
- To audit the security of read-only domain controllers☆118Updated 2 years ago
- Deserialization payload generator for a variety of .NET formatters☆174Updated last month
- Secretsdump C# version only supporting local (live) operation☆55Updated 9 months ago
- ☆94Updated 2 years ago
- Exploit for the CVE-2024-5806☆45Updated last year
- Exploits targeting vBulletin.☆75Updated 2 years ago
- This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers☆53Updated last year
- A tool for identifying and exploiting vulnerable Viewstate implementations in ASP.NET☆59Updated last month
- ☆94Updated 6 months ago
- Proof-of-concept exploit for CVE-2024-25153.☆42Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Updated 3 years ago
- RCE through a race condition in Apache Tomcat☆56Updated last year
- List of some AD tools I frequently use☆56Updated 2 months ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆41Updated 3 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆71Updated 2 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Updated 6 months ago
- Proof of Concept Exploit for CVE-2024-9464☆45Updated last year
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Updated last year
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆105Updated 2 years ago
- Tool for efficient directory enumeration☆65Updated this week
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆89Updated 2 years ago