BTtea / CVE-2026-20841-PoCView external linksLinks
PoC
☆104Updated this week
Alternatives and similar repositories for CVE-2026-20841-PoC
Users that are interested in CVE-2026-20841-PoC are comparing it to the libraries listed below
Sorting:
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated 11 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆207Nov 18, 2025Updated 2 months ago
- Bypass YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellcode sequences.☆52Oct 2, 2025Updated 4 months ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Dec 18, 2022Updated 3 years ago
- Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)☆95Apr 2, 2025Updated 10 months ago
- ☆94Jan 16, 2025Updated last year
- PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads☆238Oct 30, 2025Updated 3 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆291Updated this week
- Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108)☆32Apr 1, 2025Updated 10 months ago
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆27Oct 13, 2024Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Jul 14, 2024Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆158Nov 7, 2023Updated 2 years ago
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆52Jan 11, 2025Updated last year
- Fairy Law - Compromise or disable EDR security solutions☆68Dec 1, 2025Updated 2 months ago
- Kill Everything AV/EDR☆27Nov 18, 2024Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- ☆35Apr 14, 2025Updated 10 months ago
- Shellcode injection using the Windows Debugging API☆165Jan 4, 2026Updated last month
- Proof of concept & details for CVE-2025-21298☆195Jan 20, 2025Updated last year
- More EFS coerced authentication method with PetitPotam.py☆27Mar 21, 2023Updated 2 years ago
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆69May 31, 2025Updated 8 months ago
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 3 months ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Jun 28, 2019Updated 6 years ago
- psexecsvc - a python implementation of PSExec's native service implementation☆235Feb 11, 2025Updated last year
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Aug 6, 2024Updated last year
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆34Jan 18, 2026Updated 3 weeks ago
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆202Sep 13, 2023Updated 2 years ago
- A Qemu Proxmox Template builder project using Packer☆71Dec 5, 2025Updated 2 months ago
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- Tool to extract username and password of current user from PanGPA in plaintext☆89Dec 23, 2024Updated last year
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆79Jan 22, 2026Updated 3 weeks ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆146Jul 17, 2025Updated 6 months ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated last week
- ☆10Jan 2, 2022Updated 4 years ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49May 28, 2024Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- ☆10Jan 26, 2026Updated 3 weeks ago