0x5ECF4ULT / CVE-2020-3452
CVE-2020-3452 exploit
☆24Updated 4 years ago
Alternatives and similar repositories for CVE-2020-3452:
Users that are interested in CVE-2020-3452 are comparing it to the libraries listed below
- Alternative Mimikatz LSASS DUMPER☆12Updated 4 years ago
- Webshell plugin that works on any Atlassian product employing their plugin framework☆27Updated 7 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆26Updated 4 years ago
- CVE-2020-10199 CVE-2020-10204 Python POC☆19Updated 4 years ago
- Leak windows system info through a docx file☆12Updated 4 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4☆36Updated 5 years ago
- ☆19Updated 3 years ago
- ☆36Updated 5 years ago
- Terminate the eventlog thread to disable the windows eventlog☆20Updated 4 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 4 years ago
- ☆27Updated 3 years ago
- Use to perform Microsoft exchange account brute-force.☆73Updated 3 years ago
- This is a patched version of ExchangeRelayX☆11Updated 4 years ago
- CVE-2020-14882 Weblogic-Exp☆17Updated 4 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆13Updated 6 years ago
- An example of a downloader written in NodeJS.☆24Updated 3 years ago
- CVE-2018-16341 - Nuxeo Remote Code Execution without authentication using Server Side Template Injection☆25Updated 5 years ago
- Jboss_JMXInvokerServlet_Deserialization_RCE☆21Updated 5 years ago
- PhishReportCS is a penetration testing and red teaming tool that automates the phishing campaign reporting process for Cobalt Strike phis…☆8Updated 5 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- ☆19Updated 3 years ago
- CVE-2019-0230 Exploit POC☆15Updated 4 years ago
- Antivirus Process List☆15Updated 5 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆19Updated 6 years ago
- SharpDir is a simple code set to search both local and remote file systems for files and is compatible with Cobalt Strike.☆26Updated 5 years ago
- ☆17Updated 3 years ago
- CVE-2020–14882 by Jang☆29Updated 4 years ago
- collect☆17Updated 5 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆45Updated 3 years ago