JMousqueton / PoC-CVE-2022-30190Links
POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina
☆159Updated 3 years ago
Alternatives and similar repositories for PoC-CVE-2022-30190
Users that are interested in PoC-CVE-2022-30190 are comparing it to the libraries listed below
Sorting:
- CVE-2022-30190 Follina POC☆105Updated 3 years ago
- ☆317Updated 2 years ago
- ☆387Updated 4 years ago
- Use to build an anonymous SMB file server.☆230Updated 4 years ago
- POC for CVE-2022-1388☆232Updated 3 years ago
- ☆412Updated 2 years ago
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆308Updated 3 years ago
- POC for VMWARE CVE-2022-22954☆282Updated 3 years ago
- Proxylogon & Proxyshell & Proxyoracle & Proxytoken & All exchange server history vulns summarization :)☆548Updated last year
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆276Updated 4 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆464Updated 3 years ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆390Updated 2 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆185Updated 3 years ago
- Proof of Concept Exploit for vCenter CVE-2021-21972☆264Updated 4 years ago
- Automatic ProxyShell Exploit☆114Updated 4 years ago
- Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-softw…☆278Updated 2 years ago
- CVE-2022-26134 Proof of Concept☆165Updated 3 years ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆444Updated 2 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆795Updated last year
- PrintNotifyPotato☆528Updated 2 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆331Updated 3 years ago
- Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.☆126Updated 2 years ago
- ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)☆182Updated 3 years ago
- C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can…☆537Updated 4 years ago
- The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel☆205Updated 3 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆159Updated 3 years ago
- Use python to perform Kerberos pre-auth bruteforcing☆203Updated 2 years ago
- ☆154Updated 3 years ago
- CobaltStrike 4.0 - 4.5 Patch☆179Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Updated 3 years ago