sophoslabs / metasploit_gather_exchangeLinks
Metasploit Post-Exploitation Gather module for Exchange Server
☆25Updated 4 years ago
Alternatives and similar repositories for metasploit_gather_exchange
Users that are interested in metasploit_gather_exchange are comparing it to the libraries listed below
Sorting:
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- Finding SSL Blindspots for Red Teams☆34Updated 5 years ago
- Execute Mimikatz with different technique☆51Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Updated 4 years ago
- ☆24Updated 5 years ago
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- ☆33Updated 5 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated 3 weeks ago
- Perform Windows domain enumeration via LDAP☆37Updated 3 years ago
- Exactly what it sounds like, which is something rad☆23Updated 3 years ago
- WMI SA stuffs☆30Updated 3 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 5 years ago
- ☆19Updated 5 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 3 years ago
- AppXSVC Service race condition - privilege escalation☆29Updated 6 years ago
- ☆20Updated last year
- Execute embedded Mimikatz☆13Updated 4 years ago
- Modified version of PEAS client for offensive operations☆43Updated 2 years ago
- ☆18Updated 5 years ago
- ☆23Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago
- Cisco Unfied Call Manager enumeration☆25Updated 3 years ago
- Right-To-Left Override POC☆36Updated 3 years ago
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆31Updated 5 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Updated 4 years ago