w1ld3r / SMBGhost_Scanner
Advanced scanner for CVE-2020-0796 - SMBv3 RCE
☆14Updated last year
Alternatives and similar repositories for SMBGhost_Scanner:
Users that are interested in SMBGhost_Scanner are comparing it to the libraries listed below
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 4 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- ☆17Updated 4 years ago
- Magento Security Scanner☆15Updated 3 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 2 weeks ago
- Compiled Binaries for Sharp Suite☆13Updated 5 years ago
- all published scripts devloped by ahmed khlief☆20Updated 4 years ago
- Plaform independent reverse shell over https☆11Updated 5 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Updated 2 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- Windows privilege escalation Mafia is a framework provides all resources needed for privilege escalation beginners☆12Updated 3 years ago
- C# Situational Awareness Script☆34Updated 5 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆19Updated 6 years ago
- CVE-2020-0688 PoC☆10Updated 4 months ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆11Updated 6 years ago
- ☆16Updated 5 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 3 years ago
- PoC CVE-2020-6308☆34Updated 4 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 4 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 5 years ago
- ☆19Updated 4 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆20Updated 4 years ago