Shadow0ps / CVE-2021-28482-Exchange-POCLinks
POC from TestANull for CVE-2021-28482 on Exchange Server
☆45Updated 4 years ago
Alternatives and similar repositories for CVE-2021-28482-Exchange-POC
Users that are interested in CVE-2021-28482-Exchange-POC are comparing it to the libraries listed below
Sorting:
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆62Updated 2 years ago
- CVE-2021-21972☆33Updated 4 years ago
- ☆37Updated 7 years ago
- Webshell plugin that works on any Atlassian product employing their plugin framework☆27Updated 7 years ago
- CVE-2019-1040 with Kerberos delegation☆34Updated 4 years ago
- A standalone WMI protocol for CrackMapExec☆51Updated 5 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Updated 3 years ago
- Terminate the eventlog thread to disable the windows eventlog☆20Updated 5 years ago
- SharpAddDomainMachine☆68Updated 3 years ago
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆67Updated 11 months ago
- ☆71Updated 4 years ago
- This is a patched version of ExchangeRelayX☆14Updated 4 years ago
- ☆70Updated 4 years ago
- An improvement over the original Mimikatz wrapper.☆19Updated 3 years ago
- ☆54Updated 3 years ago
- Yet another LSASS dumper☆76Updated 4 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Updated 4 years ago
- CVE-2021-1675 (PrintNightmare)☆76Updated 4 years ago
- Use to browse the share file by eas(Exchange Server ActiveSync)☆45Updated 5 years ago
- Windows 7/2008 R2 EoP☆13Updated 4 years ago
- ☆18Updated 3 years ago
- ☆19Updated 4 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Updated 4 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆37Updated 5 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆35Updated 4 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 4 years ago
- ☆27Updated 4 years ago
- PoC to interact with local/remote registry hives through WMI☆86Updated 5 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 3 years ago