Chocapikk / CVE-2022-22954
Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960
☆2Updated 2 years ago
Alternatives and similar repositories for CVE-2022-22954:
Users that are interested in CVE-2022-22954 are comparing it to the libraries listed below
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- Case for CVE-2022-30778☆23Updated 2 years ago
- XMLRPC - RCE in MovableTypePoC☆21Updated 2 years ago
- Tomcat backdoor based on CS blog☆27Updated last year
- Port forwarding via MSRPC (445/tcp) [WIP]☆32Updated 3 years ago
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆15Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆31Updated 2 years ago
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆11Updated last year
- Exploit for Microsoft SharePoint 2019☆13Updated last year
- ☆24Updated last year
- Open-Source Phishing Toolkit☆18Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Proof of Concept Exploit for CVE-2024-9465☆28Updated 5 months ago
- CVE-2022-41040 nuclei template☆18Updated 2 years ago
- ☆14Updated 2 years ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆21Updated 3 months ago
- Analyzes AdminSDHolder permissions & compares with a previous run, to detect potential backdoor/excessive persistent permission(s)☆14Updated last year
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆34Updated 2 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆12Updated 2 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆28Updated last year
- A script used to query the dehashed API and filter for more useful results☆15Updated 3 years ago
- Ivanti EPM AgentPortal RCE Vulnerability☆21Updated 5 months ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated last year
- Zimbra CVE-2022-37042 Nuclei weaponized template☆19Updated 2 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆50Updated 6 months ago