rtandr01d / zerologonLinks
Scan for and exploit the zerologon vulnerability.
☆10Updated 5 years ago
Alternatives and similar repositories for zerologon
Users that are interested in zerologon are comparing it to the libraries listed below
Sorting:
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆99Updated 2 years ago
- Microsoft Exchange password spray tool with proxy support.☆39Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- ☆52Updated 3 years ago
- Secretsdump C# version only supporting local (live) operation☆53Updated 7 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 2 years ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Updated 10 months ago
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- The purpose of this repo is to share my research☆14Updated 8 months ago
- This repository presents a proof-of-concept of CVE-2023-22527☆11Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 3 years ago
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆13Updated last year
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Updated 8 months ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Updated 2 years ago
- Proof of Concept Exploit for CVE-2024-9465☆30Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆114Updated 3 years ago
- Exploit for Microsoft SharePoint 2019☆13Updated last year
- Exploits targeting vBulletin.☆75Updated 2 years ago
- ☆12Updated 3 years ago
- Just some random small tools for dealing with asp.net Forms Authentication Cookies☆29Updated 4 years ago
- Active Directory ACL exploitation with BloodHound☆13Updated 4 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 10 months ago
- A script used to query the dehashed API and filter for more useful results☆17Updated 4 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Updated 5 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago
- ☆19Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 3 years ago