DCOMrade

DCOM scanner

Automates enumeration of vulnerable DCOM applications to aid in lateral movement and exploitation testing

Powershell script for enumerating vulnerable DCOM Applications

GitHub

254 stars
18 watching
44 forks
Language: PowerShell
last commit: about 6 years ago

Related projects:

Repository Description Stars
spencerdodd/kernelpop Automated framework for discovering and exploiting kernel vulnerabilities on Linux and macOS. 687
codingo/reconnoitre Automates reconnaissance and service enumeration of network hosts to gather information and write recommendations for further testing. 2,124
s0md3v/striker An offensive information and vulnerability scanner that identifies potential security issues in web applications 2,238
corkami/pocs Research and experimentation with potential vulnerabilities in data hashing algorithms. 1,480
pentestpad/subzy Automates subdomain takeover vulnerability checks 1,091
infosecn1nja/maliciousmacromsbuild Generates malicious macros to bypass application whitelisting and execute powershell or shellcode via MSBuild. 495
mostaphabahadou/postenum Automates system information gathering after gaining access to a Linux system. 281
directdefense/superserial A Burp Suite Extender to identify Java Deserialization vulnerabilities in client requests and server responses. 9
0xsauby/yasuo Scans for vulnerable 3rd-party web applications on a network 570
anirudhbiyani/findmytakeover Detects DNS record misconfigurations that could be exploited by attackers 135
albuch/sbt-dependency-check Automatically monitors dependencies for known vulnerabilities and generates reports on security issues 266
bohops/rogueassemblyhunter A utility for discovering and identifying malicious .NET modules in running processes. 115
sonatype-nexus-community/auditjs Tools to scan npm packages for known vulnerabilities and outdated dependencies. 223
ropnop/windapsearch Automates LDAP queries to enumerate AD users, groups, and computers from a Windows domain 806
hackthelegacy/hack400tool A set of tools for gathering information and exploiting vulnerabilities in IBM Power Systems 97