BishopFox / cve-2024-21762-checkLinks
Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762
☆102Updated 11 months ago
Alternatives and similar repositories for cve-2024-21762-check
Users that are interested in cve-2024-21762-check are comparing it to the libraries listed below
Sorting:
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆194Updated 7 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆141Updated 5 months ago
- ☆154Updated 11 months ago
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆88Updated 7 months ago
- ☆136Updated last year
- DHCP Server Remote Code Execution impact: 2008 R2 SP1 до Server 2019☆69Updated 2 years ago
- ☆67Updated 5 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆98Updated this week
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆201Updated 8 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆131Updated 7 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dump☆150Updated 9 months ago
- ☆164Updated last year
- Exploit for the CVE-2024-5806☆45Updated last year
- CVE-2024-3400 Palo Alto OS Command Injection☆160Updated last year
- Exploit for the CVE-2023-23397☆162Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆173Updated last month
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆231Updated last year
- Evasive Golang Loader☆131Updated 10 months ago
- Stage 0☆161Updated 6 months ago
- To audit the security of read-only domain controllers☆117Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆255Updated 10 months ago
- Create Anti-Copy DRM Malware☆58Updated 10 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆140Updated 11 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆206Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- PoCs of RCEs against open source C2 servers☆84Updated 8 months ago
- Pre-Auth Exploit for CVE-2024-40711☆50Updated 9 months ago