sho-luv / zerologon
Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool will check, exploit and restore password to original state
☆16Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for zerologon
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- ☆16Updated 3 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated this week
- ☆30Updated 4 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆38Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 2 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆49Updated 3 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆52Updated 4 years ago
- Convert ldapdomaindump to Bloodhound☆76Updated 10 months ago
- ☆24Updated 3 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆17Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆47Updated 2 years ago
- ☆35Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- Modified version of PEAS client for offensive operations☆38Updated last year
- A little implant which SSH's back with a shell☆36Updated 2 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆30Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆78Updated last year
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆42Updated 3 years ago
- c# reverse shell poc☆26Updated 5 years ago
- Discord C2 Profile for Mythic☆24Updated 6 months ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 2 years ago
- cobalt strike tools☆31Updated 3 years ago
- Finding SSL Blindspots for Red Teams☆30Updated 4 years ago
- Exchangelib wrapper for pentesting☆56Updated 5 months ago
- Golng version of SharpDump that can be used to extract LSASS or any other proces. Provides token elevation prior to creating dump of high…☆21Updated 4 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆15Updated last year
- Microsoft365 Device Code Phishing Framework☆34Updated 3 years ago