uziii2208 / CVE-2025-33073Links
Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.
☆63Updated 2 months ago
Alternatives and similar repositories for CVE-2025-33073
Users that are interested in CVE-2025-33073 are comparing it to the libraries listed below
Sorting:
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆95Updated 3 weeks ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 10 months ago
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆49Updated last year
- ☆59Updated last year
- exfiltration/infiltration toolkit☆23Updated 2 years ago
- Docker container for running CobaltStrike 4.10☆37Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆54Updated last year
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆76Updated last week
- ☆55Updated 2 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆94Updated 4 months ago
- Microsoft Network Service Fingerprinting Tool☆60Updated 2 weeks ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Updated 5 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Updated 2 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆62Updated this week
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆76Updated last month
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆34Updated 2 months ago
- ☆70Updated 2 weeks ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated 2 years ago
- Permanently disable EDRs as local admin☆124Updated last month
- POC for CVE-2024-3183 (FreeIPA Rosting)☆26Updated last year
- Decrypt Chromium based browser passwords with PowerShell.☆130Updated 2 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆97Updated last year
- Repo for all my exploits/PoCs☆51Updated 8 months ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year