Lists (1)
Sort Name ascending (A-Z)
Stars
4个 .soap 版本的WebShell(持续更新维护),优点:可以运行于子目录,突破了过去只能运行于根目录的限制。4个脚本分别支持调用cmd.exe/哥斯拉/冰蝎/天蝎 客户端。
Extract credentials from lsass remotely
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by…
DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will automatically generate the userlist from the domain. BE VERY CAR…
Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell
Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the ori…
Dump lsass using only Native APIs by hand-crafting Minidump files (without MinidumpWriteDump!!!)
Use to check the valid account of the Remote Desktop Protocol(Support plaintext and ntlmhash)
Shiro-721 Padding Oracle Attack
Shiro反序列化利用工具,支持新版本(AES-GCM)Shiro的key爆破,配合ysoserial,生成回显Payload
《Golang学习资源大全-只有Go语言才能改变世界》Only Golang Can Change The World.
1、点击“检测漏洞”,会自动检测该URL是否存在S2-001、S2-005、S2-009、S2-013、S2-016、S2-019、S2-020/021、S2-032、S2-037、DevMode、S2-045/046、S2-052、S2-048、S2-053、S2-057、S2-061、S2相关log4j2十余种漏洞。 2、“批量验证”,(为防止批量geshell,此功能已经删除,并不再开…
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
NoPacScan is a CVE-2021-42287/CVE-2021-42278 Scanner,it scan for more domain controllers than other script
一款后渗透免杀工具,助力每一位像我这样的脚本小子快速实现免杀,支持bypass AV/EDR 360 火绒 Windows Defender Shellcode Loader
CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.
woodpecker框架weblogic信息探测插件