onSec-fr / CVE-2020-0688-ScannerLinks
Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.
☆39Updated 4 years ago
Alternatives and similar repositories for CVE-2020-0688-Scanner
Users that are interested in CVE-2020-0688-Scanner are comparing it to the libraries listed below
Sorting:
- Basic password spraying tool for internal tests and red teaming☆91Updated 5 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆141Updated 4 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 5 years ago
- A standalone WMI protocol for CrackMapExec☆51Updated 5 years ago
- .NET 4.0 Remote Desktop Manager Password Gatherer☆74Updated 4 years ago
- A little tool to play with Kerberos.☆66Updated 2 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆46Updated 4 years ago
- ☆71Updated 4 years ago
- Aggressor Scripts for Cobalt Strike☆76Updated last year
- CVE-2021-21972☆33Updated 4 years ago
- XOR Payload Encryptor for .NET and Payload Runner with Built-in XOR Decryptor☆45Updated 6 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆37Updated 5 years ago
- ☆37Updated 7 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Updated 5 years ago
- a secure and highly-portable reverse proxy (redirector) for your Red Team infrastructure.☆34Updated 5 years ago
- Clear All Windows System Logs - AntiForensics☆53Updated 10 years ago
- Shellcode Encrypter & Decrypter via XOR Cipher☆60Updated 5 years ago
- Kerberos TGS_REP cracker written in Golang☆56Updated 9 years ago
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆146Updated 5 years ago
- C# remote process injection utility for Cobalt Strike☆88Updated 5 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆24Updated 6 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆34Updated 4 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 5 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆59Updated 8 years ago
- Spray a hash via smb to check for local administrator access☆143Updated 4 years ago
- A sort of simple shell which support multiple protocols.☆100Updated 5 years ago
- .NET 4.0 Scheduled Job Lateral Movement☆90Updated 5 years ago
- PoC para las vulnerabilidades CVE-2020-14750 y cve-2020-14882☆48Updated 4 years ago
- CVE-2020-3452 exploit☆24Updated 5 years ago