Microsoft SharePoint Server Elevation of Privilege Vulnerability
☆236Sep 26, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2023-29357
Users that are interested in CVE-2023-29357 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆53Oct 10, 2023Updated 2 years ago
- ☆168Oct 29, 2023Updated 2 years ago
- ☆162Jun 18, 2023Updated 2 years ago
- ☆158Jul 10, 2024Updated last year
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆347Mar 17, 2023Updated 3 years ago
- CVE-2023-22515: Confluence Broken Access Control Exploit☆149Nov 12, 2025Updated 4 months ago
- ☆137Jan 8, 2024Updated 2 years ago
- POC for CVE-2022-39952☆266Feb 25, 2023Updated 3 years ago
- RCE exploit for CVE-2023-3519☆229Aug 23, 2023Updated 2 years ago
- UAC Bypass By Abusing Kerberos Tickets☆506Aug 10, 2023Updated 2 years ago
- VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)☆231Jun 13, 2023Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆740May 19, 2023Updated 2 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Updated this week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Dump NTDS with golden certificates and UnPAC the hash☆648Mar 20, 2024Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Aug 25, 2023Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆865Feb 3, 2024Updated 2 years ago
- Exploit for Microsoft SharePoint 2019☆13Dec 28, 2023Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆184Feb 2, 2026Updated last month
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆200Nov 12, 2024Updated last year
- exploit for f5-big-ip RCE cve-2023-46747☆208Oct 20, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆90Jun 18, 2023Updated 2 years ago
- VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039)☆96Sep 1, 2023Updated 2 years ago
- ☆705Nov 7, 2023Updated 2 years ago
- ☆137Jan 14, 2024Updated 2 years ago
- ☆26Mar 10, 2022Updated 4 years ago
- ☆180Jul 10, 2023Updated 2 years ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆302Feb 2, 2026Updated last month
- Terminate AV/EDR Processes using kernel driver☆352Jun 12, 2023Updated 2 years ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆226Nov 23, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆760Feb 19, 2024Updated 2 years ago
- Amsi Bypass payload that works on Windwos 11☆379Jul 30, 2023Updated 2 years ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆154Oct 12, 2023Updated 2 years ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated 11 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆901Mar 11, 2026Updated 2 weeks ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- A Windows potato to privesc☆391Aug 26, 2024Updated last year