soffensive / windowsblindreadLinks
A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system
☆204Updated 2 years ago
Alternatives and similar repositories for windowsblindread
Users that are interested in windowsblindread are comparing it to the libraries listed below
Sorting:
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- Domain user enumeration tool☆215Updated last year
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆205Updated 6 years ago
- Simple python script to extract unsafe functions from php projects☆199Updated 7 years ago
- Slides and Code for the BHUSA 2019 talk: Flying a False Flag☆235Updated 5 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆204Updated 4 years ago
- Parse NTLM challenge messages over HTTP and SMB☆149Updated 2 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆63Updated 6 years ago
- SNMP data gather scripts☆82Updated last year
- Changes for Visual Studio 2013☆118Updated 10 years ago
- ☆129Updated 7 years ago
- CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13☆63Updated 5 years ago
- Custom tools and projects about security☆110Updated this week
- Everything you need about Burp Extension Generation☆155Updated 2 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆267Updated 5 months ago
- Office 365 and Exchange Enumeration☆190Updated 6 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆178Updated 2 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆144Updated 3 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Weaponizing Splunk with reverse and bind shells.☆183Updated 8 years ago
- PEAS is a Python 2 library and command line application for running commands on an ActiveSync server e.g. Microsoft Exchange.☆178Updated 2 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆254Updated 2 years ago
- A HTA shell to assist with breakout assessments.☆113Updated 3 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆173Updated 4 years ago
- Repo with various Red Team scripts☆145Updated 4 years ago
- Enyx SNMP IPv6 Enumeration Tool☆103Updated 2 years ago
- A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.☆98Updated 6 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆308Updated 2 years ago
- A tool to create obfuscated HTA script.☆178Updated 4 years ago
- SAP Gateway RCE exploits☆156Updated 4 years ago