whokilleddb / Follina
Follina PoC exploit
☆6Updated 2 years ago
Alternatives and similar repositories for Follina:
Users that are interested in Follina are comparing it to the libraries listed below
- Extract Useful info from SSL VPN Directory Traversal Vulnerability (FG-IR-18-384)☆10Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- Custom pentesting tools☆24Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago
- Stealthy Stand Alone PHP Web Shell☆33Updated 5 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- ☆24Updated last year
- Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960☆2Updated 2 years ago
- Searching .evtx logs for remote connections☆24Updated last year
- A powerful reverse shell generator☆43Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆50Updated 2 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆20Updated 3 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated last month
- Red Teaming & Active Directory Cheat Sheet.☆39Updated last year
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆33Updated 3 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 9 months ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆32Updated 2 years ago
- HiveNightmare a.k.a. SeriousSam Local Privilege Escalation in Windows – CVE-2021-36934☆8Updated 3 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 8 months ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- RDP Checker☆62Updated 10 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- PickleC2 is a post-exploitation and lateral movements framework☆86Updated 3 years ago