Immersive-Labs-Sec / nimbuspwnLinks
This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft
☆24Updated 3 years ago
Alternatives and similar repositories for nimbuspwn
Users that are interested in nimbuspwn are comparing it to the libraries listed below
Sorting:
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 5 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆18Updated last year
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- Adobe Reader DC Information Leak Exploit☆22Updated 3 years ago
- A proof‑of‑concept C2 framework that uses Server‑Sent Events (SSE) and the MCP protocol for agent registration, command dispatch, and res…☆29Updated 6 months ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆67Updated 3 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 3 years ago
- ☆29Updated 3 years ago
- ☆18Updated last year
- ☆63Updated last year
- Yet, Another Packer/Loader☆25Updated 2 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Updated 3 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 4 years ago
- ☆28Updated 2 years ago
- Execute Mimikatz with different technique☆51Updated 4 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated 2 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- An utility to download PDB files associated with a Portable Executable (PE).☆13Updated 8 months ago
- An evil bit backdoor for iptables☆54Updated 4 years ago
- An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to …☆22Updated last year
- A tool to abuse Exchange services☆12Updated last year
- Presentaciones de congresos☆53Updated last year
- ☆23Updated 3 years ago