xzxxzzzz000 / impacket-programming-manual
impacket编程手册
☆104Updated last year
Alternatives and similar repositories for impacket-programming-manual
Users that are interested in impacket-programming-manual are comparing it to the libraries listed below
Sorting:
- If you only have hash, you can still operate exchange☆74Updated 3 years ago
- Cobalt Strike BOF that Add a user to localgroup by samr☆129Updated 2 years ago
- 通过websocket在IIS8(Windows Server 2012)以上实现socks5代理☆88Updated last year
- ad vulnerability scanner☆70Updated last year
- Zerologon exploit with restore DC password automatically☆133Updated last year
- mssqlproxy python3.5+ 并修复bug☆63Updated 2 years ago
- ☆34Updated 2 years ago
- Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具☆107Updated last year
- BOF implementation of delete self poc that delete a locked executable or a currently running file from disk by its pid, path, or the curr…☆73Updated last year
- 根据攻防以及域信息收集经验dump快而有用的域信息☆104Updated last year
- Zerologon自动化脚本☆88Updated last year
- more conveniently Visual-Studio-BOF-template☆64Updated last year
- 密码收集☆58Updated 3 years ago
- ☆49Updated 2 years ago
- 利用EFSRPC协议批量探测出网☆65Updated last year
- command execute without 445 port☆52Updated 3 years ago
- Shellcode Reductio Entropy Tools☆67Updated last year
- 多组件客户端☆74Updated 2 weeks ago
- PrintSpoofer的反射dll实现,结合Cobalt Strike使用☆88Updated 3 years ago
- (批量化改造)sharpwmi是一个基于rpc的横向移动工具,具有上传文件和执行命令功能。☆107Updated 4 years ago
- 域内普通域用户权限查找域内所有计算机上登录的用户☆150Updated 2 years ago
- 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆148Updated 3 years ago
- Binary Hollowing☆74Updated 8 months ago
- 主要用于隐藏进程真实路径,进程带windows真签名☆111Updated 7 months ago
- 汇编HTTP请求发送/Assembly Http Request☆46Updated 4 months ago
- ☆34Updated 2 months ago
- This is a third party agent for Havoc C2 written in golang.☆58Updated last year
- Red team tool designed for quickly identifying hijackable programs, evading antivirus software, and EDR (Endpoint Detection and Response)…☆66Updated 2 months ago
- C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can…☆16Updated 3 years ago
- CVE-2020-0787的简单回显☆32Updated 3 years ago