moloch-- / poc-cve-2021-4034View external linksLinks
PoC for CVE-2021-4034 dubbed pwnkit
☆35Jan 26, 2022Updated 4 years ago
Alternatives and similar repositories for poc-cve-2021-4034
Users that are interested in poc-cve-2021-4034 are comparing it to the libraries listed below
Sorting:
- A .NET binary loader that bypasses AMSI☆45Sep 20, 2021Updated 4 years ago
- DNS server for pentesters☆50Nov 2, 2025Updated 3 months ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- ☆44Oct 16, 2023Updated 2 years ago
- Python3 tool to perform password spraying using RDP☆16Aug 14, 2023Updated 2 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- ☆26May 22, 2021Updated 4 years ago
- ☆48Nov 18, 2020Updated 5 years ago
- Powershell and python utilties for Entra Connect☆28Jun 5, 2025Updated 8 months ago
- A port of FuzzySecurity's UrbanBishop project for inline shellcode execution☆119Sep 29, 2020Updated 5 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Feb 2, 2020Updated 6 years ago
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated last month
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- A proof-of-concept malicious Chrome extension☆89Jul 19, 2022Updated 3 years ago
- ☆26Mar 10, 2022Updated 3 years ago
- ☆18Aug 15, 2021Updated 4 years ago
- Fast website scraper and wordlist generator☆82May 6, 2025Updated 9 months ago
- Exchangelib wrapper for pentesting☆67Feb 17, 2025Updated last year
- Nim version of MDSec's Parallel Syscall PoC☆124Jan 14, 2022Updated 4 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- ☆199Jan 30, 2026Updated 2 weeks ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆33Jan 27, 2026Updated 3 weeks ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆191May 26, 2020Updated 5 years ago
- Hijack Printconfig.dll to execute shellcode☆100Jan 15, 2021Updated 5 years ago
- Golang Implant & Post-Exploitation Framework☆60Jun 30, 2023Updated 2 years ago
- TCP reverse shell written in C# with the option to choose between Windows command prompt or MS powershell.☆26May 9, 2019Updated 6 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 4 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Oct 4, 2022Updated 3 years ago
- Pure Go rewrite of knockknock☆11Feb 7, 2023Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆190Dec 19, 2023Updated 2 years ago