uziii2208 / CVE-2025-33073Links
Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.
☆49Updated this week
Alternatives and similar repositories for CVE-2025-33073
Users that are interested in CVE-2025-33073 are comparing it to the libraries listed below
Sorting:
- Docker container for running CobaltStrike 4.10☆37Updated last year
- ☆59Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆48Updated 10 months ago
- Duplicate not owned Token from Running Process☆72Updated 2 years ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 9 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 9 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆90Updated 2 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- ☆35Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated last week
- Exploits Unauth Docker API☆42Updated 7 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆78Updated last year
- Deploy a phishing infrastructure on the fly.☆78Updated 10 months ago
- Source code and examples for PassiveAggression☆64Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆30Updated last year
- ☆55Updated 11 months ago
- ☆28Updated 2 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Updated 2 months ago
- Tool to aid in dumping LSASS process remotely☆42Updated last month
- ☆52Updated 2 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Updated 6 months ago