youncyb / CVE-2020-0688Links
CVE-2020-0688
☆10Updated 5 years ago
Alternatives and similar repositories for CVE-2020-0688
Users that are interested in CVE-2020-0688 are comparing it to the libraries listed below
Sorting:
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Updated 5 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆19Updated 4 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Windows privilege escalation Mafia is a framework provides all resources needed for privilege escalation beginners☆12Updated 3 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Updated 5 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 5 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆12Updated 6 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Updated 3 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- Magento Security Scanner☆15Updated 3 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- ☆17Updated 6 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated last year
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- Working exploit code for CVE-2019-17625☆18Updated 5 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago