ErrorNoInternet / FollinaScanner
A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)
☆24Updated 2 years ago
Alternatives and similar repositories for FollinaScanner:
Users that are interested in FollinaScanner are comparing it to the libraries listed below
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆32Updated 3 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆80Updated last year
- CVE-2021-40444☆65Updated 3 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆19Updated 3 weeks ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆64Updated 3 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆35Updated 2 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated 4 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- Basic Dart reverse shell code☆21Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- ☆16Updated 6 years ago
- PoC-Malware-TTPs☆49Updated 2 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 3 years ago
- Some Cyber Security related scripts☆18Updated last year
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆27Updated 2 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆38Updated 4 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Updated 2 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last month
- MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script...☆15Updated last year
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Create a lnk shortcut file for Windows☆17Updated 6 years ago
- ☆14Updated 2 years ago
- ☆12Updated last year
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago