parteeksingh005 / ExploitRemotingService_CompiledLinks
☆13Updated 4 years ago
Alternatives and similar repositories for ExploitRemotingService_Compiled
Users that are interested in ExploitRemotingService_Compiled are comparing it to the libraries listed below
Sorting:
- python spraying tools based on impacket lib☆55Updated 3 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 4 years ago
- Automating payload generation for OSEP labs and exam.☆34Updated 3 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆88Updated 3 years ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 3 years ago
- ☆46Updated 8 years ago
- Checks for signature requirements over LDAP☆98Updated 3 years ago
- Get SYSTEM via SeDebugPrivilege☆24Updated 3 years ago
- Exploiting CVE-2021-44228 in vCenter for remote code execution and more.☆109Updated 4 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆118Updated 3 years ago
- ☆51Updated 3 years ago
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆39Updated 2 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Impersonating authentication over HTTP and/or named pipes.☆142Updated 4 years ago
- DCSync Attack from Outside using Impacket☆116Updated 3 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆61Updated 2 years ago
- CVE-2021-27928 MariaDB/MySQL-'wsrep provider' 命令注入漏洞☆62Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆132Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆100Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆133Updated 4 years ago
- ☆55Updated 3 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆111Updated 3 years ago
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆36Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- ☆29Updated 3 years ago
- ☆18Updated last year
- Creates a malicious ODF document help leak NetNTLM Creds☆37Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆114Updated 2 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Updated 4 years ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆79Updated 3 years ago