HoangKien1020 / CVE-2020-14321Links
Course enrolments allowed privilege escalation from teacher role into manager role to RCE
☆44Updated 4 years ago
Alternatives and similar repositories for CVE-2020-14321
Users that are interested in CVE-2020-14321 are comparing it to the libraries listed below
Sorting:
- InfluxDB CVE-2019-20933 vulnerability exploit☆41Updated 3 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 4 years ago
- WordPress - Authenticated XXE (CVE-2021-29447)☆42Updated 4 years ago
- Shell Simulation over Net-SNMP with extend functionality☆98Updated 4 years ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Updated 5 years ago
- RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer☆56Updated 5 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- ☆34Updated 3 years ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆94Updated 4 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆13Updated 5 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆59Updated 2 years ago
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago
- Collection of username lists for enumerating kerberos domain users☆100Updated 7 years ago
- ☆31Updated 5 years ago
- Apache Spark Shell Command Injection Vulnerability☆87Updated 3 years ago
- ☆51Updated 3 years ago
- Material from CTF machines I have attempted☆36Updated 4 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆23Updated 4 years ago
- ☆13Updated 4 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆56Updated last year
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆90Updated 5 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆19Updated this week
- ☆42Updated last year
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Updated 5 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆81Updated 4 years ago
- Reverse Shell-able Windows exploits short POCs.☆32Updated 5 years ago
- Pentest stuff☆49Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year