watchtowrlabs / connectwise-screenconnect_auth-bypass-add-user-pocLinks
☆70Updated last year
Alternatives and similar repositories for connectwise-screenconnect_auth-bypass-add-user-poc
Users that are interested in connectwise-screenconnect_auth-bypass-add-user-poc are comparing it to the libraries listed below
Sorting:
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆88Updated last year
- Pre-Auth Exploit for CVE-2024-40711☆50Updated 9 months ago
- ☆57Updated 8 months ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- List of some AD tools I frequently use☆47Updated last month
- CVE-2025-5777 (CitrixBleed 2) - Critical memory leak vulnerability affecting Citrix NetScaler ADC and Gateway devices☆26Updated this week
- Exploit for the CVE-2024-5806☆45Updated last year
- ☆52Updated last year
- ☆68Updated 5 months ago
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆54Updated 2 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆77Updated 7 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 10 months ago
- Proof of Concept Exploit for CVE-2024-9464☆45Updated 9 months ago
- ☆42Updated last week
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆38Updated 5 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆96Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆114Updated 11 months ago
- Simple C2 using GitHub repository as comms channel.☆31Updated 8 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 10 months ago
- PowerShell Reverse Shell☆78Updated 2 years ago
- .NET deserialization hunter☆77Updated 11 months ago
- ysoserial.net docker image☆28Updated 9 months ago
- Java archive implant toolkit.☆61Updated 2 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Tool to extract username and password of current user from PanGPA in plaintext☆85Updated 6 months ago
- Source code and examples for PassiveAggression☆61Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆71Updated last year
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago
- Password spraying tool for Microsoft Online accounts (Entra/Azure/O365)☆33Updated last year