Hunting for Microsoft Exchange the LDAP Way.
☆35Oct 30, 2019Updated 6 years ago
Alternatives and similar repositories for exchange_hunter2
Users that are interested in exchange_hunter2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2018-8581☆373Oct 21, 2022Updated 3 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 4 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- lateral movement techniques that can be used during red team exercises☆277Jan 13, 2020Updated 6 years ago
- A repo to hold any bypasses I work on/study/whatever☆19Dec 30, 2020Updated 5 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Apr 6, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Basic password spraying tool for internal tests and red teaming☆88Mar 21, 2020Updated 6 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆605Mar 2, 2021Updated 5 years ago
- An injector that aims to be stealthy by using non suspicious API calls. Inspired by (https://github.com/FuzzySecurity/Sharp-Suite/tree/ma…☆24Jun 17, 2020Updated 5 years ago
- Python tool to inject fake updates into unencrypted WSUS traffic☆113Oct 23, 2015Updated 10 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- ☆20Dec 8, 2018Updated 7 years ago
- ☆128May 22, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A simple email generator that uses dorks on Bing to generate emails from LinkedIn Profiles.☆151Oct 19, 2022Updated 3 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- Elite is the client-side component of the Covenant project. Covenant is a .NET command and control framework that aims to highlight the a…☆124Jul 7, 2023Updated 2 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Oct 28, 2019Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 5 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 7 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Inject Encrypted Commands Into EMF Shapes for C2 In VBA / Office Malware☆39Jul 10, 2020Updated 5 years ago
- adding a backdooruser using win32api☆80Sep 3, 2020Updated 5 years ago
- ☆37Jun 27, 2020Updated 5 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 5 years ago
- Credential Dumper☆79Feb 19, 2020Updated 6 years ago