JMousqueton / PoC-CVE-2022-30190
POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina
☆158Updated 2 years ago
Alternatives and similar repositories for PoC-CVE-2022-30190:
Users that are interested in PoC-CVE-2022-30190 are comparing it to the libraries listed below
- CVE-2022-30190 Follina POC☆105Updated 2 years ago
- ☆314Updated 2 years ago
- ☆407Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆366Updated 3 years ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆371Updated 2 years ago
- ☆520Updated 3 years ago
- ☆382Updated 3 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆273Updated 3 years ago
- POC for VMWARE CVE-2022-22954☆281Updated 3 years ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆177Updated 2 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆326Updated 2 years ago
- Shellcode launcher for AV bypass☆215Updated last year
- PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.☆107Updated 2 years ago
- ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)☆179Updated 3 years ago
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆319Updated 2 years ago
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆126Updated 2 years ago
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆364Updated last year
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆308Updated 3 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆774Updated last year
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆451Updated last year
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆258Updated last year
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆463Updated 2 years ago
- XLL Phishing Tradecraft☆421Updated 2 years ago
- POC for CVE-2022-1388☆232Updated 3 years ago
- Go shellcode loader that combines multiple evasion techniques☆366Updated last year
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆275Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆378Updated 2 years ago
- Windows Token Stealing Expert☆470Updated last year
- MSSQL Database Attacker tool☆189Updated 2 years ago
- Credential Guard Bypass Via Patching Wdigest Memory☆323Updated 2 years ago