Trackflaw / CVE-2023-23397
Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.
☆123Updated 2 years ago
Alternatives and similar repositories for CVE-2023-23397
Users that are interested in CVE-2023-23397 are comparing it to the libraries listed below
Sorting:
- Windows Privilege Escalation☆60Updated 2 years ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 3 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆111Updated 2 years ago
- PowerShell Asynchronous TCP Reverse Shell☆157Updated last year
- PrintNightmare (CVE-2021-34527) PoC Exploit☆109Updated 2 years ago
- ☆216Updated last year
- MSSQL Database Attacker tool☆189Updated 2 years ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆157Updated last year
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆129Updated last year
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆267Updated 2 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆137Updated last year
- PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.☆107Updated 2 years ago
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆126Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆71Updated 8 months ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆169Updated 6 months ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆83Updated 3 years ago
- Evasive Golang Loader☆131Updated 9 months ago
- ☆165Updated 9 months ago
- Awesome AV/EDR/XDR Bypass Tips☆271Updated 2 years ago
- DCSync Attack from Outside using Impacket☆113Updated 3 years ago
- ☆163Updated last year
- A webshell application and interactive shell for pentesting Apache Tomcat servers.☆103Updated 3 months ago
- CVE-2021-40444☆65Updated 3 years ago
- Beacon Object File PoC implementation of KillDefender☆227Updated 3 years ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆234Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.☆300Updated 2 years ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆255Updated 9 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated last year
- CVE-2024-3400☆72Updated last year
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆197Updated 10 months ago