soffensive / windowsblindread
A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system
☆202Updated last year
Alternatives and similar repositories for windowsblindread:
Users that are interested in windowsblindread are comparing it to the libraries listed below
- Domain user enumeration tool☆215Updated last year
- Automating juicy potato local privilege escalation exploit for penetration testers☆142Updated 3 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆202Updated 6 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- Parse NTLM challenge messages over HTTP and SMB☆145Updated 2 years ago
- Simple python script to extract unsafe functions from php projects☆199Updated 7 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆267Updated 2 months ago
- CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13☆63Updated 5 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆177Updated 2 years ago
- Changes for Visual Studio 2013☆117Updated 9 years ago
- Everything you need about Burp Extension Generation☆153Updated 2 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆63Updated 6 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆167Updated 2 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆245Updated 8 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆304Updated 2 years ago
- ntlm relay attack to Exchange Web Services☆331Updated 7 years ago
- ☆294Updated 4 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆218Updated 5 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆203Updated last year
- ☆128Updated 7 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆174Updated 4 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆250Updated 2 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆219Updated last year
- Office 365 and Exchange Enumeration☆187Updated 5 years ago
- ☆235Updated 6 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆204Updated 4 years ago
- An Insider Threat Toolkit☆151Updated 6 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago