DCOMrade

DCOM scanner

Automates enumeration of vulnerable DCOM applications to aid in lateral movement and exploitation testing

Powershell script for enumerating vulnerable DCOM Applications

GitHub

254 stars
18 watching
44 forks
Language: PowerShell
last commit: almost 6 years ago

Related projects:

Repository Description Stars
spencerdodd/kernelpop Automated framework for discovering and exploiting kernel vulnerabilities on Linux and macOS. 687
codingo/reconnoitre Automates reconnaissance and service enumeration of network hosts to gather information and write recommendations for further testing. 2,110
s0md3v/striker An offensive information and vulnerability scanner that identifies potential security issues in web applications 2,234
corkami/pocs Research and experimentation with potential vulnerabilities in data hashing algorithms. 1,475
pentestpad/subzy Automates subdomain takeover vulnerability checks 1,063
infosecn1nja/maliciousmacromsbuild Generates malicious macros to bypass application whitelisting and execute powershell or shellcode via MSBuild. 494
mostaphabahadou/postenum Automates system information gathering after gaining access to a Linux system. 279
directdefense/superserial A Burp Suite Extender to identify Java Deserialization vulnerabilities in client requests and server responses. 9
0xsauby/yasuo Scans for vulnerable 3rd-party web applications on a network 569
anirudhbiyani/findmytakeover Detects DNS record misconfigurations that could be exploited by attackers 135
albuch/sbt-dependency-check Automatically monitors dependencies for known vulnerabilities and generates reports on security issues 266
bohops/rogueassemblyhunter A utility for discovering and identifying malicious .NET modules in running processes. 115
sonatype-nexus-community/auditjs Tools to scan npm packages for known vulnerabilities and outdated dependencies. 223
ropnop/windapsearch Automates LDAP queries to enumerate AD users, groups, and computers from a Windows domain 799
hackthelegacy/hack400tool A set of tools for gathering information and exploiting vulnerabilities in IBM Power Systems 96