Chocapikk / CVE-2023-29357
Microsoft SharePoint Server Elevation of Privilege Vulnerability
☆231Updated last year
Alternatives and similar repositories for CVE-2023-29357
Users that are interested in CVE-2023-29357 are comparing it to the libraries listed below
Sorting:
- ☆154Updated 10 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆255Updated 9 months ago
- ☆163Updated last year
- Escalate Service Account To LocalSystem via Kerberos☆395Updated last year
- ☆137Updated last year
- Everything and anything related to password spraying☆135Updated 11 months ago
- Attempt at Obfuscated version of SharpCollection☆207Updated last week
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆301Updated 6 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆219Updated 2 months ago
- Awesome AV/EDR/XDR Bypass Tips☆271Updated 2 years ago
- Amsi Bypass payload that works on Windwos 11☆377Updated last year
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆194Updated 6 months ago
- Exploit for the CVE-2023-23397☆161Updated 2 years ago
- Continuous password spraying tool☆184Updated 2 months ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆157Updated last year
- Use ESC1 to perform a makeshift DCSync and dump hashes☆207Updated last year
- psexecsvc - a python implementation of PSExec's native service implementation☆196Updated 3 months ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆200Updated 7 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆141Updated 4 months ago
- Reverse shell that can bypass windows defender detection☆165Updated last year
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆202Updated 4 months ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆518Updated 3 weeks ago
- Impacket is a collection of Python classes for working with network protocols.☆282Updated 4 months ago
- yet another AV killer tool using BYOVD☆270Updated last year
- ☆277Updated last year
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆461Updated last month
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated last year
- Kill AV/EDR leveraging BYOVD attack☆354Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructure☆137Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆272Updated last year