youncyb / CVE-2020-0688
CVE-2020-0688
☆10Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2020-0688
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- Magento Security Scanner☆15Updated 2 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- Working exploit code for CVE-2019-17625☆17Updated 4 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆20Updated 4 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 6 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 4 years ago
- Windows privilege escalation Mafia is a framework provides all resources needed for privilege escalation beginners☆12Updated 2 years ago
- Helper script to deal with offsets when doing work in debuggers.☆12Updated 5 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Updated 5 years ago
- Simple C2 over the Trello API☆37Updated last year
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- A Flexible Web Shell Client, Built on Electron☆13Updated last year
- Self defense post module for metasploit☆17Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆17Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆18Updated 4 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆14Updated 3 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- treafik fronted c2 examples☆26Updated 3 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Updated 3 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago