tinkersec / cve-2020-1350View external linksLinks
Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2003 up to Windows Server 2019.
☆104Jul 15, 2020Updated 5 years ago
Alternatives and similar repositories for cve-2020-1350
Users that are interested in cve-2020-1350 are comparing it to the libraries listed below
Sorting:
- HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Se…☆280Jun 10, 2021Updated 4 years ago
- A denial-of-service proof-of-concept for CVE-2020-1350☆237Jul 17, 2020Updated 5 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- A simple Python SSH server that reveals passwords of connecting clients☆32Jul 7, 2017Updated 8 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Aug 26, 2021Updated 4 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- Python Client for Nessus REST API☆13Feb 17, 2015Updated 10 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- POC Script for CVE-2020-12800: RCE through Unrestricted File Type Upload☆27Jan 6, 2023Updated 3 years ago
- Dirty Cow implement in Go☆11Nov 3, 2016Updated 9 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- Stub for polymorphic code☆11Mar 18, 2023Updated 2 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- ☆272Jul 10, 2023Updated 2 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Jun 28, 2019Updated 6 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆255Sep 30, 2022Updated 3 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆218Oct 14, 2020Updated 5 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆986Dec 4, 2022Updated 3 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Dec 24, 2014Updated 11 years ago
- CVE-2019-0230 Exploit POC☆15Aug 21, 2020Updated 5 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆14Nov 30, 2021Updated 4 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 6 years ago
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- ☆100Mar 9, 2021Updated 4 years ago
- This is a small script to make the local exploitation process easier. It downloads the precompiled exploit for x86 and x64 architectures …☆31Aug 30, 2017Updated 8 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆233Sep 16, 2021Updated 4 years ago
- A Burp Extension designed to identify argument injection vulnerabilities.☆122Apr 16, 2019Updated 6 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆372Oct 30, 2020Updated 5 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Feb 1, 2022Updated 4 years ago
- ☆127Oct 28, 2021Updated 4 years ago
- Shared reverse shell over Discord☆136Apr 18, 2021Updated 4 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Jun 16, 2022Updated 3 years ago