RickdeJager / cupshax
☆221Updated last month
Related projects ⓘ
Alternatives and complementary repositories for cupshax
- Exploit for the vulnerability CVE-2024-43044 in Jenkins☆163Updated last month
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆124Updated 7 months ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆227Updated last year
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆186Updated last year
- CVE-2024-32002 RCE PoC☆102Updated 5 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty☆186Updated 4 months ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆329Updated 2 months ago
- CVE-2024-3400 Palo Alto OS Command Injection☆150Updated 6 months ago
- exploit for f5-big-ip RCE cve-2023-46747☆202Updated 3 weeks ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆115Updated last year
- Repository to store exploits created by Assetnotes Security Research team☆175Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆211Updated 6 months ago
- This repository presents a proof-of-concept of CVE-2023-7028☆235Updated 10 months ago
- CVE-2023-33733 reportlab RCE☆112Updated last year
- CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability☆125Updated 3 weeks ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆239Updated 3 months ago
- ☆147Updated 4 months ago
- VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)☆232Updated last year
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆112Updated 7 months ago
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆296Updated 4 months ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆239Updated 5 months ago
- GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the /etc/passwd file from a system running GitLab…☆142Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆196Updated this week
- CVE-2023-4911 proof of concept☆163Updated last year
- A rapid HTTP downgrade smuggling scanner written in Go.☆247Updated 5 months ago
- A Windows potato to privesc☆340Updated 2 months ago
- Escalate Service Account To LocalSystem via Kerberos☆390Updated last year
- CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code☆318Updated 4 months ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆492Updated 3 months ago
- A script to automate privilege escalation with CVE-2023-22809 vulnerability☆148Updated last year