Wh04m1001 / CVE-2023-20178Links
☆90Updated 2 years ago
Alternatives and similar repositories for CVE-2023-20178
Users that are interested in CVE-2023-20178 are comparing it to the libraries listed below
Sorting:
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆110Updated 2 years ago
- ☆120Updated 9 months ago
- ☆184Updated 3 years ago
- Pre-Auth Exploit for CVE-2024-40711☆54Updated last year
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆79Updated 3 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆118Updated 3 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆132Updated 2 years ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated 2 years ago
- A LAPS dumper written using the impacket library.☆32Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Updated last year
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated 2 years ago
- ACL abuse swiss-knife☆125Updated 2 years ago
- ☆161Updated 2 years ago
- ☆68Updated 3 years ago
- ☆88Updated 3 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated 2 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Updated last year
- ☆223Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆115Updated 2 years ago
- ☆129Updated 2 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Updated 3 years ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆121Updated last year
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆102Updated 3 years ago
- Socks5 / Socks4 client and server library☆72Updated 2 months ago
- To audit the security of read-only domain controllers☆118Updated 2 years ago
- Rusty Impersonate☆102Updated 2 months ago
- POC for Veeam Backup and Replication CVE-2023-27532☆70Updated 2 years ago