C1ph3rX13 / CVE-2023-42820Links
CVE-2023-42820
☆55Updated last year
Alternatives and similar repositories for CVE-2023-42820
Users that are interested in CVE-2023-42820 are comparing it to the libraries listed below
Sorting:
- ☆40Updated last year
- 🗽 基于Socket RAW,利用 NTLMSSP 探测 Windows远程主机信息☆50Updated 2 years ago
- kill windows log☆45Updated last year
- CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839☆61Updated last year
- The Poc for CVE-2024-20931☆74Updated last year
- Asset scanning by dictionary stitching Domain to identify Exchange Servers versions☆44Updated 2 years ago
- ☆94Updated 2 years ago
- Cobalt Strike plugin☆53Updated last year
- EWSTool是一个针对EXCHANGE邮件服务器的后渗透利用工具。使用ews接口,实现人员邮箱列表获取、搜索邮件、下载邮件等实用功能。☆61Updated 6 months ago
- RCE on Apache Solr 8.3.1☆42Updated 2 years ago
- Zerologon自动化脚本☆95Updated 2 years ago
- CrackMapExec extension module/protocol support☆41Updated 2 years ago
- 根据攻防以及域信息收集经验dump快而有用的域信息☆103Updated 2 years ago
- 利用EFSRPC协议批量探测出网☆65Updated last year
- a 'pentest' udf plugin of MySQL.☆36Updated 3 years ago
- portreuse reuseport 端口复用☆62Updated 2 years ago
- Lsass memory dump.☆53Updated last year
- detect gitlab detail version☆54Updated last year
- 域横向,内网信息收集利用工具☆30Updated 2 years ago
- 密码收集☆58Updated 3 years ago
- CVE-2023-36899漏洞的复现环境和工具,针对ASP.NET框架中的无cookie会话身份验证绕过。☆31Updated 2 years ago
- 窃取当前用户的ssh,sudo密码☆69Updated 2 years ago
- Yapi mock script RCE another version. Webshell way. 另一种 Webshell 方式的 Yapi 命令执行的方法 相比于其他的利用方式 更加微操和可控 影响更小☆66Updated last year
- sliver-webhook 实现上线通知☆26Updated 2 years ago
- Supershell反制☆29Updated 2 years ago
- 修改:https://github.com/projectdiscovery/cdncheck☆51Updated last year
- RPC 调用添加ssp扩展dump lsass☆19Updated 3 years ago
- Tools developed during the personal learning process☆23Updated 3 years ago
- badusb联动cobaltrstrike近源攻击☆26Updated 4 years ago
- ad vulnerability scanner☆72Updated last year