zcgonvh / CVE-2020-17144View external linksLinks
weaponized tool for CVE-2020-17144
☆159Dec 9, 2020Updated 5 years ago
Alternatives and similar repositories for CVE-2020-17144
Users that are interested in CVE-2020-17144 are comparing it to the libraries listed below
Sorting:
- Exchange2010 authorized RCE☆157Dec 24, 2020Updated 5 years ago
- Exploit and detect tools for CVE-2020-0688☆356Mar 21, 2020Updated 5 years ago
- WINDOWS TELEMETRY权限维持☆258Jul 2, 2020Updated 5 years ago
- 利用NTLM Hash读取Exchange邮件☆441Jan 7, 2025Updated last year
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆252Mar 31, 2021Updated 4 years ago
- ☆94Aug 29, 2018Updated 7 years ago
- 这是一个一键辅助抓取360安全浏览器密码的CobaltStrike脚本以及解密小工具,用于节省红队工作量,通过下载浏览器数据库、记录密钥来离线解密浏览器密码。☆638Apr 4, 2021Updated 4 years ago
- CVE-2021-3156非交互式执行命令☆203Feb 9, 2021Updated 5 years ago
- [ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains.…☆178Oct 21, 2022Updated 3 years ago
- 提取DC日志,快速获取域用户对应IP地址☆308Mar 21, 2022Updated 3 years ago
- Support ALL Windows Version☆722Sep 11, 2020Updated 5 years ago
- SharpAddDomainMachine☆69Oct 12, 2021Updated 4 years ago
- ☆159Aug 4, 2020Updated 5 years ago
- Cobalt Strike Aggressor Scripts☆70Dec 7, 2019Updated 6 years ago
- reGeorg的特殊版本,适用于老版本weblogic。☆151Apr 30, 2020Updated 5 years ago
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆187Jun 17, 2020Updated 5 years ago
- Memshell☆292Dec 7, 2021Updated 4 years ago
- 修改的SweetPotato,使之可以用于CobaltStrike v4.0☆246Apr 30, 2020Updated 5 years ago
- 内网渗透中常用的c#程序整合成cs脚本,直接内存加载。持续更新~☆498Feb 13, 2020Updated 6 years ago
- 这个脚本主要提供对Exchange邮件服务器的账户爆破功能,集成了现有主流接口的爆破方式。☆339May 22, 2023Updated 2 years ago
- Windows对抗沙箱和虚拟机的方法总结☆402Apr 22, 2020Updated 5 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆817Dec 14, 2023Updated 2 years ago
- 读取登录过本机的登录失败或登录成功的所有计算机信息,在内网渗透中快速定位运维管理人员。☆221Sep 30, 2019Updated 6 years ago
- 几条关于CVE-2020-15148(yii2反序列化)的绕过☆75Sep 21, 2020Updated 5 years ago
- 影子用户 克隆☆232Dec 30, 2021Updated 4 years ago
- JCE - JSP/JPSX CodeEncode - 用于 Webshell 逃避静态查杀的辅助脚本☆258Oct 29, 2021Updated 4 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆140Nov 4, 2020Updated 5 years ago
- CVE-2019-1040 with Kerberos delegation☆33Jun 18, 2021Updated 4 years ago
- attackRmi☆258Oct 14, 2020Updated 5 years ago
- 通过 Redis 主从写出无损文件☆719May 25, 2020Updated 5 years ago
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- Bypass cobaltstrike beacon config scan☆84May 24, 2021Updated 4 years ago
- WarSQLKit is a fileless rootkit and attack tool I developed for MS-SQL. With this tool you can rootkit the SQL service that uses CLR on M…☆262Dec 19, 2023Updated 2 years ago
- Use to browse the share file by eas(Exchange Server ActiveSync)☆46Jun 28, 2020Updated 5 years ago
- sharpwmi是一个基于rpc的横向移动工具,具有上传文件和执行命令功能。☆717Aug 3, 2021Updated 4 years ago
- Cobalt Strike插件 - RDP日志取证&清除☆363Dec 23, 2019Updated 6 years ago
- CVE-2019-1040 with Exchange☆253Jun 18, 2021Updated 4 years ago
- 红队行动中利用白利用、免杀、自动判断网络环境生成钓鱼可执行文件。☆366Jun 19, 2024Updated last year
- mstsc.exe Path Traversal to RCE POC☆91May 23, 2019Updated 6 years ago