JMousqueton / PoC-CVE-2022-30190Links
POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina
☆158Updated 3 years ago
Alternatives and similar repositories for PoC-CVE-2022-30190
Users that are interested in PoC-CVE-2022-30190 are comparing it to the libraries listed below
Sorting:
- CVE-2022-30190 Follina POC☆105Updated 3 years ago
- ☆409Updated 2 years ago
- ☆317Updated 2 years ago
- PrintNotifyPotato☆524Updated 2 years ago
- POC for VMWARE CVE-2022-22954☆282Updated 3 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆465Updated 2 years ago
- Proxylogon & Proxyshell & Proxyoracle & Proxytoken & All exchange server history vulns summarization :)☆536Updated last year
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆372Updated 2 years ago
- ☆522Updated 3 years ago
- RCE exploit for CVE-2023-3519☆224Updated last year
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆368Updated 3 years ago
- ☆384Updated 3 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆184Updated 3 years ago
- Windows Token Stealing Expert☆472Updated last year
- CobaltStrike 4.0 - 4.5 Patch☆178Updated 2 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆781Updated last year
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆454Updated last year
- PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.☆107Updated 3 years ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆260Updated last year
- Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles☆389Updated 2 years ago
- Go shellcode loader that combines multiple evasion techniques☆370Updated 2 years ago
- XLL Phishing Tradecraft☆423Updated 3 years ago
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆308Updated 3 years ago
- C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can…☆525Updated 3 years ago
- ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)☆180Updated 3 years ago
- Automatic ProxyShell Exploit☆114Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆379Updated 2 years ago
- Use to build an anonymous SMB file server.☆232Updated 3 years ago
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆325Updated 2 years ago
- VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)☆232Updated 2 years ago