mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2024-12-11 09:04:25 -05:00
Post Exploitation > sud0woodo/DCOMrade
This commit is contained in:
parent
adba31a224
commit
2c088ed42d
@ -1336,6 +1336,10 @@ This repository is created as an online bookmark for useful links, resources and
|
|||||||
<td><a href="https://github.com/DanMcInerney/icebreaker">DanMcInerney/icebreaker</a></td>
|
<td><a href="https://github.com/DanMcInerney/icebreaker">DanMcInerney/icebreaker</a></td>
|
||||||
<td>Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment</td>
|
<td>Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><a href="https://github.com/sud0woodo/DCOMrade">sud0woodo/DCOMrade</a></td>
|
||||||
|
<td>Powershell script for enumerating vulnerable DCOM Applications</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><a href="https://github.com/eladshamir/Internal-Monologue">eladshamir/Internal-Monologue</a></td>
|
<td><a href="https://github.com/eladshamir/Internal-Monologue">eladshamir/Internal-Monologue</a></td>
|
||||||
<td>Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS</td>
|
<td>Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS</td>
|
||||||
|
Loading…
Reference in New Issue
Block a user