p0dalirius / RemoteMouse-3.008-ExploitLinks
This exploit allows to connect to the remote RemoteMouse 3.008 service to virtually press arbitrary keys and execute code on the machine.
☆61Updated 11 months ago
Alternatives and similar repositories for RemoteMouse-3.008-Exploit
Users that are interested in RemoteMouse-3.008-Exploit are comparing it to the libraries listed below
Sorting:
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Updated last year
- ☆49Updated 3 months ago
- Windows Privilege Escalation☆70Updated 3 years ago
- SeRestorePrivilege to SYSTEM☆132Updated 4 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)☆20Updated 3 years ago
- A python script to extract information from a Microsoft Remote Desktop Web Access (RDWA) application☆112Updated 3 weeks ago
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆25Updated last year
- A webshell plugin and interactive shell for pentesting a WordPress website.☆105Updated 3 weeks ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆41Updated 2 months ago
- Automated exploitation of MSSQL servers at scale☆127Updated this week
- ☆44Updated 3 months ago
- CLI monitor for windows process- & file activity☆95Updated 5 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- A webshell plugin and interactive shell for pentesting a LimeSurvey application.☆22Updated last year
- rcat☆75Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- SeManageVolumePrivilege to SYSTEM☆146Updated 2 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆60Updated 3 years ago
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆30Updated 11 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆135Updated last year
- Simple PoC in PowerShell for CVE-2023-23397☆39Updated 2 years ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆54Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆26Updated last year
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆26Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- PrintNightmare (CVE-2021-34527) PoC Exploit☆119Updated 3 years ago
- Reverse TCP shell in PowerShell for fun. Made in spring 2020 with inspiration from (and a few fixes to) samratashok/nishang Invoke-PowerS…☆73Updated last year
- ☆63Updated 2 years ago