onSec-fr / CVE-2020-0688-ScannerLinks
Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.
☆39Updated 4 years ago
Alternatives and similar repositories for CVE-2020-0688-Scanner
Users that are interested in CVE-2020-0688-Scanner are comparing it to the libraries listed below
Sorting:
- Basic password spraying tool for internal tests and red teaming☆91Updated 5 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆141Updated 5 years ago
- .NET 4.0 Remote Desktop Manager Password Gatherer☆74Updated 5 years ago
- A standalone WMI protocol for CrackMapExec☆51Updated 5 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆46Updated 4 years ago
- A little tool to play with Kerberos.☆66Updated 2 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 5 years ago
- ☆37Updated 7 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- XOR Payload Encryptor for .NET and Payload Runner with Built-in XOR Decryptor☆46Updated 6 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆38Updated 5 years ago
- ☆71Updated 5 years ago
- .NET 4.0 Scheduled Job Lateral Movement☆90Updated 5 years ago
- C# remote process injection utility for Cobalt Strike☆88Updated 5 years ago
- CVE-2020-3452 exploit☆24Updated 5 years ago
- Clear All Windows System Logs - AntiForensics☆53Updated 10 years ago
- backdoor c2☆41Updated 5 years ago
- CVE-2021-21972☆33Updated 4 years ago
- A sort of simple shell which support multiple protocols.☆99Updated 6 years ago
- Aggressor script to integrate Phant0m with Cobalt Strike☆27Updated 8 years ago
- Search files for extensions as well as text within.☆120Updated 4 years ago
- ☆71Updated 4 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 4 years ago
- This is a Poc for BIGIP iControl unauth RCE☆51Updated 4 years ago
- a secure and highly-portable reverse proxy (redirector) for your Red Team infrastructure.☆34Updated 6 years ago
- PoC to interact with local/remote registry hives through WMI☆86Updated 5 years ago
- Yet another LSASS dumper☆74Updated 4 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆60Updated 8 years ago
- Aggressor Scripts for Cobalt Strike☆76Updated last year
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆26Updated 5 years ago