Wh04m1001 / CVE-2023-20178Links
β90Updated 2 years ago
Alternatives and similar repositories for CVE-2023-20178
Users that are interested in CVE-2023-20178 are comparing it to the libraries listed below
Sorting:
- β185Updated 2 years ago
- πΎDogwalk PoC (using diagcab file to obtain RCE on windows)β79Updated 3 years ago
- β119Updated 6 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX sectionβ106Updated 2 years ago
- β222Updated last year
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teamsβ131Updated last year
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell proβ¦β84Updated 2 years ago
- β129Updated 2 years ago
- β88Updated 3 years ago
- ACL abuse swiss-knifeβ123Updated 2 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCEβ63Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replicationβ114Updated 2 years ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).β93Updated 2 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeysβ137Updated last year
- β160Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Adminβ174Updated 2 years ago
- β68Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploitβ116Updated 2 years ago
- Pre-Auth Exploit for CVE-2024-40711β54Updated last year
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or chβ¦β90Updated 3 months ago
- Finding secrets in kernel and user memoryβ115Updated 2 years ago
- An open-source process injection enumeration tool written in C#β173Updated 2 years ago
- Unfixed Windows PowerShell Filename Code Execution POCβ41Updated last year
- A LAPS dumper written using the impacket library.β32Updated 2 years ago
- POC tools for exploring SMB over QUIC protocolβ127Updated 3 years ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installersβ124Updated last year
- To audit the security of read-only domain controllersβ117Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.β97Updated last year
- Some scripts to support with importing large datasets into BloodHoundβ79Updated last year
- β122Updated 2 years ago