rtandr01d / zerologonLinks
Scan for and exploit the zerologon vulnerability.
☆10Updated 5 years ago
Alternatives and similar repositories for zerologon
Users that are interested in zerologon are comparing it to the libraries listed below
Sorting:
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆47Updated 2 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆55Updated last year
- Microsoft Exchange password spray tool with proxy support.☆40Updated 4 years ago
- ☆52Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆96Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆59Updated 2 months ago
- Secretsdump C# version only supporting local (live) operation☆50Updated 4 months ago
- Ivanti EPM SQL Injection Remote Code Execution Vulnerability☆25Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- Exploit for Microsoft SharePoint 2019☆13Updated last year
- Just some random small tools for dealing with asp.net Forms Authentication Cookies☆25Updated 4 years ago
- The purpose of this repo is to share my research☆14Updated 5 months ago
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Updated 5 months ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Updated 7 months ago
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆77Updated 3 years ago
- A script used to query the dehashed API and filter for more useful results☆17Updated 4 years ago
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 11 months ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated 3 months ago
- Active Directory share enumeration tool☆12Updated 4 months ago
- Tool for efficient directory enumeration☆62Updated 10 months ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆111Updated 3 years ago
- Active Directory ACL exploitation with BloodHound☆13Updated 4 years ago
- Exploits targeting vBulletin.☆75Updated 2 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Updated last year