Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.
☆67Nov 14, 2025Updated 5 months ago
Alternatives and similar repositories for CVE-2025-33073
Users that are interested in CVE-2025-33073 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Opengraph-Compatible JSON Generator for BloodHound☆28Mar 30, 2026Updated 2 weeks ago
- AADInternals Authenticator Android App☆11Jul 2, 2020Updated 5 years ago
- Python tool to automatically perform SPN-less RBCD attacks.☆128Jan 7, 2026Updated 3 months ago
- CVE-2019–9193 - PostgreSQL 9.3-12.3 Authenticated Remote Code Execution☆20May 26, 2022Updated 3 years ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆173Jul 31, 2025Updated 8 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Enhanced, Faster, Better version of the exploit☆25Dec 27, 2025Updated 3 months ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- ☆216Dec 17, 2025Updated 4 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- Windows Access token manipulation tool made in C#☆25Aug 24, 2025Updated 7 months ago
- Openfire Console Authentication Bypass Vulnerability with RCE plugin☆55Mar 7, 2024Updated 2 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 9 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 3 months ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Lastest Hashcat rules for password cracking☆71Apr 8, 2026Updated last week
- Custom built Syntax Highlight tool for Word Documents☆26Sep 13, 2024Updated last year
- ☆20Sep 6, 2025Updated 7 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆113Dec 28, 2025Updated 3 months ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- A C# utility for interacting with SCOM☆98Dec 2, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- ☆20Sep 8, 2019Updated 6 years ago
- Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.☆188Dec 23, 2025Updated 3 months ago
- SPI flash read MitM attack PoC☆40May 24, 2022Updated 3 years ago
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.☆212Jan 6, 2026Updated 3 months ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- CLI monitor for windows process- & file activity☆97Nov 20, 2020Updated 5 years ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆168Nov 2, 2025Updated 5 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Simple web app to track OWASP WSTG security testing progress☆28Sep 12, 2025Updated 7 months ago
- BasicEventViewer4 (BEV v4.0), this code will useful for All Blue/Purple Teams , RealTime Monitoring Sysmon Events , Mitre Attack Detectio…☆19Jun 22, 2023Updated 2 years ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 2 months ago
- A highly flexible AI Agent-driven EVM smart contract vulnerability detection framework☆68Feb 14, 2026Updated 2 months ago
- A powerful Go tool for finding origin IPs of domains by querying multiple security APIs and validating results with built-in HTTP client.☆44Dec 4, 2025Updated 4 months ago
- Tactical Race Exploitation & Concurrency Orchestrator☆27Jan 4, 2026Updated 3 months ago
- SPAM filter rules for Stalwart Mail Server☆16Updated this week