Immersive-Labs-Sec / nimbuspwn
This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft
☆22Updated 2 years ago
Alternatives and similar repositories for nimbuspwn:
Users that are interested in nimbuspwn are comparing it to the libraries listed below
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆42Updated 4 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- some sploits☆17Updated 3 months ago
- Proof of Concept Exploit for CVE-2024-9465☆27Updated 3 months ago
- An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to …☆20Updated last year
- ☆23Updated 2 years ago
- ☆25Updated 2 years ago
- ☆57Updated 10 months ago
- Another AMSI bypass - but in C++.☆23Updated last year
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 2 years ago
- Right-To-Left Override POC☆34Updated 2 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆29Updated 2 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆31Updated 7 months ago
- ☆29Updated 2 years ago
- Critical Vulnerabilities in Trend Micro Deep Security Agent for Linux☆28Updated 3 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆44Updated 2 years ago
- ☆19Updated last year
- A simple Nim stager (w/ fiber execution)☆16Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- XOR-based shellcode encoder☆31Updated last year
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 3 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆12Updated 2 years ago
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆22Updated 2 years ago
- ☆12Updated 2 years ago
- Get SYSTEM via SeDebugPrivilege☆18Updated 2 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆23Updated last year
- load dumped csharp binaries as assemblies and launch them in memory☆26Updated 11 months ago
- OSED Practice binary☆24Updated last year