w1ld3r / SMBGhost_Scanner
Advanced scanner for CVE-2020-0796 - SMBv3 RCE
☆14Updated last year
Alternatives and similar repositories for SMBGhost_Scanner:
Users that are interested in SMBGhost_Scanner are comparing it to the libraries listed below
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- Red Team C2 and Post Exploitation Code☆36Updated this week
- all published scripts devloped by ahmed khlief☆20Updated 4 years ago
- ☆17Updated 4 years ago
- ☆16Updated 5 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 4 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- ☆19Updated 4 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Plaform independent reverse shell over https☆11Updated 5 years ago
- An Ansible role to install cobalt-strike☆16Updated 4 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Updated 7 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- ☆24Updated 4 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆20Updated 4 years ago
- Windows privilege escalation Mafia is a framework provides all resources needed for privilege escalation beginners☆12Updated 3 years ago
- Microsoft Applocker evasion tool☆38Updated 5 years ago
- treafik fronted c2 examples☆26Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 4 years ago
- Compiled Binaries for Sharp Suite☆13Updated 5 years ago
- Everything related to Cobalt Strike☆15Updated 5 years ago
- Magento Security Scanner☆15Updated 3 years ago