rtandr01d / zerologonLinks
Scan for and exploit the zerologon vulnerability.
☆10Updated 5 years ago
Alternatives and similar repositories for zerologon
Users that are interested in zerologon are comparing it to the libraries listed below
Sorting:
- This repository presents a proof-of-concept of CVE-2023-22527☆11Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆105Updated 2 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated 2 years ago
- Exploit for Microsoft SharePoint 2019☆13Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- ☆12Updated 3 years ago
- Microsoft Exchange password spray tool with proxy support.☆39Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Updated 3 years ago
- Active Directory share enumeration tool☆12Updated 9 months ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Updated 7 months ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated 2 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 3 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- ☆55Updated 3 years ago
- A script used to query the dehashed API and filter for more useful results☆17Updated 4 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Updated 11 months ago
- Just some random small tools for dealing with asp.net Forms Authentication Cookies☆30Updated 4 years ago
- The purpose of this repo is to share my research☆14Updated 9 months ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆60Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Updated last year
- Exploits Unauth Docker API☆43Updated 9 months ago
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- Extract all users from an Active Directory domain to an Excel worksheet.☆35Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Updated 6 months ago
- Proof of Concept Exploit for CVE-2024-9465☆30Updated last year
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆56Updated 2 years ago
- Duplicate not owned Token from Running Process☆74Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago
- Cobalt Strike BOFS☆16Updated 2 years ago