0x5ECF4ULT / CVE-2020-3452
CVE-2020-3452 exploit
☆24Updated 4 years ago
Alternatives and similar repositories for CVE-2020-3452:
Users that are interested in CVE-2020-3452 are comparing it to the libraries listed below
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4☆36Updated 5 years ago
- This is a patched version of ExchangeRelayX☆11Updated 4 years ago
- Alternative Mimikatz LSASS DUMPER☆12Updated 4 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Updated 6 years ago
- Show AV Processes list☆14Updated 4 years ago
- Leak windows system info through a docx file☆12Updated 5 years ago
- ☆36Updated 6 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆49Updated 4 years ago
- Cobalt Strike Aggressor Scripts are custom penetration testing and red teaming scripts for use with Cobalt Strike.☆8Updated 5 years ago
- CVE-2019-1040 with Kerberos delegation☆33Updated 3 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆26Updated 4 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- Terminate the eventlog thread to disable the windows eventlog☆20Updated 4 years ago
- PhishReportCS is a penetration testing and red teaming tool that automates the phishing campaign reporting process for Cobalt Strike phis…☆8Updated 5 years ago
- ☆17Updated 3 years ago
- CVE-2020-14882 Weblogic-Exp☆17Updated 4 years ago
- Apache Module Backdoor (PoC)☆48Updated 5 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆19Updated 6 years ago
- ☆19Updated 4 years ago
- An example of a downloader written in NodeJS.☆24Updated 3 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Updated 4 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Webshell plugin that works on any Atlassian product employing their plugin framework☆27Updated 7 years ago
- Use to perform Microsoft exchange account brute-force.☆73Updated 3 years ago
- SharpDir is a simple code set to search both local and remote file systems for files and is compatible with Cobalt Strike.☆26Updated 5 years ago
- CVE-2020-10199 CVE-2020-10204 Python POC☆19Updated 4 years ago
- SharpAddDomainMachine☆67Updated 3 years ago
- Antivirus Process List☆15Updated 5 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆45Updated 3 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago