onSec-fr / CVE-2020-0688-ScannerLinks
Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.
☆39Updated 4 years ago
Alternatives and similar repositories for CVE-2020-0688-Scanner
Users that are interested in CVE-2020-0688-Scanner are comparing it to the libraries listed below
Sorting:
- Basic password spraying tool for internal tests and red teaming☆91Updated 5 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆141Updated 4 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 5 years ago
- A little tool to play with Kerberos.☆66Updated 2 years ago
- .NET 4.0 Remote Desktop Manager Password Gatherer☆74Updated 4 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- ☆37Updated 7 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆46Updated 4 years ago
- .NET 4.0 Scheduled Job Lateral Movement☆90Updated 5 years ago
- XOR Payload Encryptor for .NET and Payload Runner with Built-in XOR Decryptor☆45Updated 6 years ago
- A standalone WMI protocol for CrackMapExec☆51Updated 5 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Updated 5 years ago
- C# remote process injection utility for Cobalt Strike☆88Updated 5 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆38Updated 5 years ago
- Aggressor Scripts for Cobalt Strike☆76Updated last year
- Search files for extensions as well as text within.☆120Updated 3 years ago
- ☆71Updated 5 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆95Updated 5 years ago
- Clear All Windows System Logs - AntiForensics☆53Updated 10 years ago
- CVE-2021-21972☆33Updated 4 years ago
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Updated 4 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆59Updated 8 years ago
- Spray a hash via smb to check for local administrator access☆143Updated 4 years ago
- Various Aggressor Scripts I've Created.☆151Updated 3 years ago
- Yet another LSASS dumper☆76Updated 4 years ago
- PowerView menu for Cobalt Strike☆68Updated 7 years ago
- SharpAddDomainMachine☆69Updated 3 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆34Updated 4 years ago
- ☆39Updated 5 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 5 years ago