sophoslabs / metasploit_gather_exchangeView external linksLinks
Metasploit Post-Exploitation Gather module for Exchange Server
☆25Mar 26, 2021Updated 4 years ago
Alternatives and similar repositories for metasploit_gather_exchange
Users that are interested in metasploit_gather_exchange are comparing it to the libraries listed below
Sorting:
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Quick script to check for plagiarism between two documents☆16Nov 22, 2020Updated 5 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- Cloud Discovery - brute force public AWS, GCP, Alibaba, and Azure cloud services☆24Jan 21, 2021Updated 5 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Jan 5, 2022Updated 4 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 4 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Mar 3, 2021Updated 4 years ago
- ☆27Mar 5, 2023Updated 2 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 3 years ago
- ☆27Jul 11, 2022Updated 3 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Imports IP address and CIDR information into a SQLite Database format☆15Feb 3, 2026Updated 2 weeks ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Sep 21, 2020Updated 5 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 3 years ago
- Generate very tiny reverse shell binaries for Linux~☆76May 22, 2020Updated 5 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- EMVLogger is an open-source tool for testing and analyzing EMV chip cards and transaction logs using a comprehensive EMV Kernel Library. …☆13Jun 15, 2024Updated last year
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- Golang的工具库(Tools of Golang)☆13Updated this week
- ☆10Aug 9, 2024Updated last year
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46May 31, 2023Updated 2 years ago
- generate CobaltStrike's cross-platform payload☆34Jun 16, 2024Updated last year
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆186Nov 19, 2025Updated 2 months ago
- Assistant/watchdog for Counterstake Bridge https://counterstake.org☆13Dec 26, 2025Updated last month
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Windows Protected Process Light toggle tool — dynamically finds offsets and patches EPROCESS using RTCore64☆66May 2, 2025Updated 9 months ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- Password list generator for password spraying - prebaked with goodies☆108Feb 21, 2023Updated 2 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- Aruba Instant (IAP) - Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago