Poc script for ProxyShell exploit chain in Exchange Server
☆24Feb 24, 2022Updated 4 years ago
Alternatives and similar repositories for Proxyshell-Exchange
Users that are interested in Proxyshell-Exchange are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 利用正则对不同的目标进行匹配,URL,js,遍历文件夹文件☆19Mar 2, 2022Updated 4 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆30Aug 16, 2021Updated 4 years ago
- A C# tool for extracting information from SCCM PXE boot media.☆52Jan 14, 2026Updated 3 months ago
- WordPress version scanner written in Python.☆15Jun 18, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Some Attacks of Exchange SSRF ProxyLogon&ProxyShell☆168Oct 12, 2021Updated 4 years ago
- game of active directory (SnapLabs version)☆17Aug 12, 2025Updated 8 months ago
- zimbra "zmslapd" lpe☆23Oct 27, 2021Updated 4 years ago
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆31Feb 11, 2025Updated last year
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆23Jun 22, 2021Updated 4 years ago
- ☆83Jan 26, 2025Updated last year
- Kernel module that makes it possible to create virtual wifi devices each with a virtualized stack.☆11Dec 13, 2011Updated 14 years ago
- E-commerce company owners of today have the challenge of picking the best online payment system from among hundreds of options available …☆10Aug 22, 2022Updated 3 years ago
- Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207☆121Aug 25, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆210Nov 18, 2025Updated 5 months ago
- A home internet server configuration for the BeagleBone Black, Raspberry Pi or Cubieboard☆10Jun 16, 2014Updated 11 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- MacOS Big Sur Sharing Host VPN with Guest☆14May 5, 2021Updated 4 years ago
- ☆16Nov 15, 2022Updated 3 years ago
- Terminate the eventlog thread to disable the windows eventlog☆21Apr 1, 2020Updated 6 years ago
- ☆11Nov 7, 2016Updated 9 years ago
- GolenGMSA tool for working with GMSA passwords☆178Apr 28, 2026Updated last week
- 利用NTLM Hash读取Exchange邮件☆59May 13, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆18Jun 1, 2024Updated last year
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Sep 2, 2022Updated 3 years ago
- PowerShell Script to automatically abuse the BadSuccessor vulnerability (CVE-2025-53779)☆45Nov 19, 2025Updated 5 months ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆182Apr 10, 2025Updated last year
- 注入c#控制台到非托管进程☆17May 9, 2022Updated 3 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- CrackCaptcahLogin☆16Nov 22, 2017Updated 8 years ago
- 隐藏c2的巧妙方法使用slack平台☆10Apr 24, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- CVE-2021-40438 exploit PoC with Docker setup.☆12Oct 24, 2021Updated 4 years ago
- Default plugins for Jaeles Scanner☆36Nov 5, 2020Updated 5 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆912Apr 24, 2026Updated last week
- A simple implementation of a 4G LTE Core Network following the 5G Core approach☆12Aug 6, 2019Updated 6 years ago
- 对存在验证码的站点爆破☆12Apr 6, 2022Updated 4 years ago
- crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.☆32Mar 15, 2022Updated 4 years ago
- Oh-my-zsh theme for pentesters which includes the date, time, and IP address for pentest logging.☆48Jan 30, 2024Updated 2 years ago