JMousqueton / PoC-CVE-2022-30190Links
POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina
☆160Updated 3 years ago
Alternatives and similar repositories for PoC-CVE-2022-30190
Users that are interested in PoC-CVE-2022-30190 are comparing it to the libraries listed below
Sorting:
- CVE-2022-30190 Follina POC☆104Updated 3 years ago
- ☆414Updated 3 years ago
- ☆323Updated 2 years ago
- POC for VMWARE CVE-2022-22954☆281Updated 3 years ago
- A REAL DoS exploit for CVE-2022-21907☆129Updated 3 years ago
- ☆386Updated 4 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆185Updated 4 years ago
- Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.☆126Updated 2 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆278Updated 4 years ago
- POC for CVE-2022-1388☆231Updated 3 years ago
- CVE-2022-26134 Proof of Concept☆166Updated 3 years ago
- Use to build an anonymous SMB file server.☆232Updated 4 years ago
- PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers☆95Updated 2 years ago
- Proof of Concept Exploit for vCenter CVE-2021-21972☆269Updated 4 years ago
- PrintNotifyPotato☆537Updated 3 years ago
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆308Updated 3 years ago
- Proxylogon & Proxyshell & Proxyoracle & Proxytoken & All exchange server history vulns summarization :)☆557Updated 2 years ago
- Automatic ProxyShell Exploit☆115Updated 4 years ago
- ☆153Updated 3 years ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆399Updated 2 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆464Updated 3 years ago
- Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-softw…☆278Updated 2 years ago
- The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel☆208Updated 4 years ago
- Authenticated Remote Command Execution in Gitlab via GitHub import☆224Updated 3 years ago
- ☆137Updated 4 years ago
- Windows Token Stealing Expert☆482Updated 2 years ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆450Updated 2 years ago
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆127Updated 2 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆344Updated 3 years ago
- Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207☆118Updated 2 years ago