☆58Jul 16, 2017Updated 8 years ago
Alternatives and similar repositories for ms17-010-Scanner
Users that are interested in ms17-010-Scanner are comparing it to the libraries listed below
Sorting:
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆168Jun 8, 2017Updated 8 years ago
- Diff tool for comparing export tables in PE images☆24Mar 4, 2020Updated 5 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Powershell VNC injector☆341Jun 29, 2020Updated 5 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 7 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Mar 8, 2019Updated 6 years ago
- ☆264Jul 15, 2022Updated 3 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated last month
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Collect some PoC that I writted .记录自己写过的PoC ..☆22Dec 20, 2017Updated 8 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- Remote Assistance Volatile Environment LPE☆15Jun 28, 2025Updated 8 months ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 6 years ago
- PowerDNS: Powershell DNS Delivery☆216Sep 26, 2018Updated 7 years ago
- A dns server that use to hijack other dns request in a wifi network for redirect to your custem http server ..☆20Jun 25, 2015Updated 10 years ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 10 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Jun 21, 2017Updated 8 years ago
- Exchange privilege escalations to Active Directory☆806Apr 23, 2023Updated 2 years ago
- Reconnaissance tool for Microsoft Office 365☆69Nov 21, 2018Updated 7 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Sep 26, 2021Updated 4 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- ☆14Feb 27, 2017Updated 9 years ago
- Exploit primitives for PowerShell☆437Mar 25, 2018Updated 7 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- x86 emulator with DOS [unofficial mirror]☆12Oct 13, 2025Updated 4 months ago
- ☆10Apr 8, 2018Updated 7 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- Some tools☆10Dec 5, 2017Updated 8 years ago