Wh04m1001 / CVE-2023-20178Links
☆90Updated 2 years ago
Alternatives and similar repositories for CVE-2023-20178
Users that are interested in CVE-2023-20178 are comparing it to the libraries listed below
Sorting:
- ☆184Updated 3 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆108Updated 2 years ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆79Updated 3 years ago
- ☆120Updated 8 months ago
- A LAPS dumper written using the impacket library.☆32Updated 2 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- ☆68Updated 3 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆118Updated 3 years ago
- ☆88Updated 3 years ago
- ACL abuse swiss-knife☆125Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆178Updated 2 years ago
- ☆129Updated 2 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆132Updated 2 years ago
- ☆84Updated last year
- To audit the security of read-only domain controllers☆117Updated 2 years ago
- ☆223Updated 2 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆70Updated 2 years ago
- ☆161Updated 2 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆139Updated last year
- Pre-Auth Exploit for CVE-2024-40711☆54Updated last year
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆114Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Updated 11 months ago
- A RunAs clone with the ability to specify the password as an argument.☆112Updated 2 years ago
- ☆80Updated last year
- Lateral Movement☆125Updated 2 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆121Updated last year
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆93Updated 5 months ago
- Duplicate not owned Token from Running Process☆73Updated 2 years ago