mr-r3b00t / CVE-2021-44228
Backdoor detection for VMware view
☆13Updated 3 years ago
Alternatives and similar repositories for CVE-2021-44228:
Users that are interested in CVE-2021-44228 are comparing it to the libraries listed below
- ☆14Updated 3 years ago
- ☆16Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Brute Force and Scan WinRm Service☆13Updated 5 years ago
- parsers to make life easier☆12Updated 4 years ago
- Searching .evtx logs for remote connections☆24Updated last year
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆19Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Log4j-Scanner with Bind-Receipt and custom hostnames☆18Updated 3 years ago
- A Canary which fires when uninstalled☆34Updated 3 years ago
- AppXSVC Service race condition - privilege escalation☆27Updated 5 years ago
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆23Updated 7 months ago
- A collection of my presentation materials.☆16Updated 9 months ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- various slides and presentations I've worked on☆18Updated 11 months ago
- ☆20Updated 4 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- A PowerShell script to prevent Sysmon from writing its events☆14Updated 4 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆25Updated 2 years ago
- module for certexfil☆15Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 5 years ago
- Continuous kerberoast monitor☆44Updated last year
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 3 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last month