simplylu / CVE-2021-42694
Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)
☆18Updated last year
Alternatives and similar repositories for CVE-2021-42694:
Users that are interested in CVE-2021-42694 are comparing it to the libraries listed below
- A little implant which SSH's back with a shell☆37Updated 3 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Updated 4 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆28Updated last year
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Updated 3 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆26Updated 4 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last month
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆34Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- I used this to see if an EDR is running in Safe Mode☆36Updated 4 years ago
- pyForgeCert is a Python equivalent of the ForgeCert.☆66Updated last year
- CVE-2020-0688 PoC☆11Updated 5 months ago
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- Windows 权限提升 BadPotato☆13Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆29Updated last year
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- Re-implementation of VirtueSecurity's benigncertain-monitor☆11Updated 4 years ago
- Applied Offensive Programming: Build your own RedTeam C2☆11Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆35Updated 3 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Updated 4 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18Updated 4 years ago
- Reverse shell macro using Word VBA☆14Updated 4 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago