tinkersec / cve-2020-1350
Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2003 up to Windows Server 2019.
☆103Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for cve-2020-1350
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆176Updated last year
- Web-based check for Windows privesc vulnerabilities☆138Updated last year
- Automating juicy potato local privilege escalation exploit for penetration testers☆138Updated 3 years ago
- HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Se…☆280Updated 3 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆172Updated 4 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆244Updated 2 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆84Updated 3 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆199Updated last year
- ☆289Updated 4 months ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆201Updated 4 years ago
- Microsoft External Attack Tool☆177Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆216Updated 2 years ago
- ☆161Updated last year
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆234Updated 3 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 4 years ago
- This is a PowerShell Empire launcher PoC using PrintDemon and Faxhell.☆198Updated 4 years ago
- lateral movement techniques that can be used during red team exercises☆265Updated 4 years ago
- Office 365 and Exchange Enumeration☆181Updated 5 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆254Updated 2 years ago
- Exploit to SYSTEM for CVE-2021-21551☆237Updated 3 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆210Updated 4 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆219Updated 4 years ago
- Parse NTLM challenge messages over HTTP and SMB☆143Updated last year
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆163Updated 2 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆137Updated 3 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆182Updated 3 years ago