JMousqueton / PoC-CVE-2022-30190Links
POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina
☆159Updated 3 years ago
Alternatives and similar repositories for PoC-CVE-2022-30190
Users that are interested in PoC-CVE-2022-30190 are comparing it to the libraries listed below
Sorting:
- CVE-2022-30190 Follina POC☆105Updated 3 years ago
- Use to build an anonymous SMB file server.☆231Updated 4 years ago
- ☆412Updated 2 years ago
- POC for CVE-2022-1388☆232Updated 3 years ago
- POC for VMWARE CVE-2022-22954☆282Updated 3 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆276Updated 4 years ago
- ☆317Updated 2 years ago
- ☆387Updated 4 years ago
- Proxylogon & Proxyshell & Proxyoracle & Proxytoken & All exchange server history vulns summarization :)☆545Updated last year
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆185Updated 3 years ago
- Proof of Concept Exploit for vCenter CVE-2021-21972☆264Updated 4 years ago
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆308Updated 3 years ago
- ☆154Updated 3 years ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆391Updated 2 years ago
- Automatic ProxyShell Exploit☆115Updated 3 years ago
- Use python to perform Kerberos pre-auth bruteforcing☆201Updated 2 years ago
- PrintNotifyPotato☆525Updated 2 years ago
- ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)☆182Updated 3 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆331Updated 3 years ago
- The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel☆203Updated 3 years ago
- CVE-2022-26134 Proof of Concept☆165Updated 3 years ago
- Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207☆116Updated 2 years ago
- VMware vCenter 7.0.2.00100 unauth Arbitrary File Read + SSRF + Reflected XSS☆221Updated 3 years ago
- Authenticated Remote Command Execution in Gitlab via GitHub import☆222Updated 2 years ago
- Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-softw…☆278Updated 2 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆465Updated 3 years ago
- Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.☆126Updated 2 years ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆443Updated 2 years ago
- ☆137Updated 4 years ago
- Windows Token Stealing Expert☆474Updated last year