watchtowrlabs / CVE-2024-40711
Pre-Auth Exploit for CVE-2024-40711
☆39Updated 5 months ago
Alternatives and similar repositories for CVE-2024-40711:
Users that are interested in CVE-2024-40711 are comparing it to the libraries listed below
- ☆54Updated 3 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 5 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆27Updated 4 months ago
- Tool to aid in dumping LSASS process remotely☆38Updated 6 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆52Updated 2 months ago
- ☆52Updated last year
- DFSCoerce exe revisited version with custom authentication☆38Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆35Updated last year
- ☆52Updated 3 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 8 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 8 months ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- Python tool to interact with WMI StdRegProv☆54Updated 2 months ago
- Beacon Object Files (BOF) for Cobalt Strike.☆27Updated 5 months ago
- Source code and examples for PassiveAggression☆55Updated 8 months ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆29Updated last year
- Secretsdump C# version only supporting local (live) operation☆48Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆36Updated 5 months ago
- ☆46Updated 2 years ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆62Updated 8 months ago
- Discord C2 Profile for Mythic☆26Updated 9 months ago
- Proof-of-Concept for CVE-2024-46538☆46Updated last month
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆72Updated 2 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆39Updated last year
- Situational Awareness script to identify how and where to run implants☆45Updated 2 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆21Updated 5 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆35Updated 2 months ago