Wh04m1001 / CVE-2023-20178
☆92Updated last year
Alternatives and similar repositories for CVE-2023-20178:
Users that are interested in CVE-2023-20178 are comparing it to the libraries listed below
- ☆182Updated 2 years ago
- ☆88Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆169Updated 2 years ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆80Updated 2 years ago
- ☆162Updated last year
- Tool for viewing NTDS.dit☆150Updated last week
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆133Updated 6 months ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆253Updated last year
- Weaponized HellsGate/SigFlip☆198Updated last year
- ☆220Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆145Updated 10 months ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆147Updated 2 years ago
- Local & remote Windows DLL Proxying☆162Updated 9 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆160Updated 3 months ago
- ☆117Updated last year
- ☆114Updated last year
- PoC to coerce authentication from Windows hosts using MS-WSP☆230Updated last year
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆100Updated last year
- POC for Veeam Backup and Replication CVE-2023-27532☆63Updated last year
- Run Your Payload Without Running Your Payload☆180Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆107Updated 2 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆132Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated last year
- ☆112Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆108Updated 2 years ago
- POC tools for exploring SMB over QUIC protocol☆121Updated 2 years ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 8 months ago
- To audit the security of read-only domain controllers☆114Updated last year