This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"
☆29May 1, 2018Updated 8 years ago
Alternatives and similar repositories for pdf-NTLMLeaker
Users that are interested in pdf-NTLMLeaker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Dec 15, 2021Updated 4 years ago
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆187May 15, 2022Updated 3 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆309Jul 4, 2023Updated 2 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- experimental wildcard subdomain filtering prototype☆14Aug 5, 2023Updated 2 years ago
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆17Dec 21, 2021Updated 4 years ago
- ☆18Jun 12, 2025Updated 10 months ago
- ☆17Dec 16, 2021Updated 4 years ago
- Stop Defender Service using C# via Token Impersonation☆170Jan 30, 2022Updated 4 years ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆59Feb 7, 2024Updated 2 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- ☆173Jul 27, 2024Updated last year
- Simple HTTP listener for security testing☆21Oct 7, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability☆10Jul 12, 2024Updated last year
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- Apple BLE research☆31Dec 1, 2019Updated 6 years ago
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- This repository presents a proof-of-concept of CVE-2024-23897☆17Apr 16, 2024Updated 2 years ago
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆20Nov 2, 2024Updated last year
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- POC tools for exploring SMB over QUIC protocol☆132Apr 6, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Simple Python 3 script to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading☆195Dec 13, 2021Updated 4 years ago
- Testing POC for use cases☆26Nov 24, 2024Updated last year
- CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization☆92Nov 18, 2018Updated 7 years ago
- win32k LPE☆464Jan 27, 2022Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Apr 19, 2021Updated 5 years ago
- A collection of domain lists obtained from zone-walking TLDs. Updated daily.☆29Updated this week
- Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527☆19Jul 12, 2021Updated 4 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 4 years ago
- CTF toolbox☆23Apr 2, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆939Sep 2, 2025Updated 8 months ago
- a Go code to detect leaks in JS files via regex patterns☆152Oct 20, 2021Updated 4 years ago
- ☆28Oct 18, 2022Updated 3 years ago
- a smart DNS response-guided subdomain fuzzer☆156Jan 3, 2023Updated 3 years ago
- Burpsuite HTTP 插件,主要用于内网测试,可定制Content-Type和Response Content☆24Jul 2, 2018Updated 7 years ago
- a multithreaded fast tool to preform active subdomain enumeration☆36Sep 13, 2022Updated 3 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago