Sachinart / CVE-2024-38063-pocLinks
Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.
☆86Updated 9 months ago
Alternatives and similar repositories for CVE-2024-38063-poc
Users that are interested in CVE-2024-38063-poc are comparing it to the libraries listed below
Sorting:
- ☆136Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆141Updated 5 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆98Updated last week
- ☆154Updated 11 months ago
- An aggressor script that can help automate payload building in Cobalt Strike☆117Updated last year
- PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)☆43Updated 11 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆88Updated 7 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆69Updated last month
- Proof of concept & details for CVE-2025-21298☆184Updated 5 months ago
- Chrome browser extension-based Command & Control☆147Updated 4 months ago
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆103Updated 11 months ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆132Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆154Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Updated last year
- ☆68Updated 5 months ago
- ☆164Updated last year
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆137Updated 6 months ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆157Updated last year
- ☆63Updated 4 months ago
- A Tool that aims to evade av with binary padding☆152Updated 11 months ago
- Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...☆157Updated 9 months ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆135Updated 3 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆75Updated 9 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆110Updated 6 months ago
- POC exploit for CVE-2024-49138☆249Updated 4 months ago
- Zimbra - Remote Command Execution (CVE-2024-45519)☆124Updated 2 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆150Updated 9 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year