CVE-2021-26855: PoC (Not a HoneyPoC for once!)
☆27Apr 26, 2025Updated 10 months ago
Alternatives and similar repositories for Exch-CVE-2021-26855
Users that are interested in Exch-CVE-2021-26855 are comparing it to the libraries listed below
Sorting:
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- 带回显版本的漏洞利用脚本☆25Mar 5, 2021Updated 5 years ago
- Misery Loader to bypass modern EDR solutions☆18Dec 20, 2024Updated last year
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 3 years ago
- CyberChef update scripts in PowerShell & Bash☆17Apr 22, 2024Updated last year
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Sep 17, 2025Updated 5 months ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- ☆12Jul 23, 2021Updated 4 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆48Feb 23, 2026Updated 2 weeks ago
- 日常积累,用以保存学习或比赛中遇到的漏洞复现文件,会有一些基本的说明文件☆18Apr 24, 2021Updated 4 years ago
- ☆47Feb 11, 2023Updated 3 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- SharpRDP改编版☆20May 7, 2020Updated 5 years ago
- A Reverse Shell which uses an XML file on an SMB share as a communication channel.☆17Feb 17, 2024Updated 2 years ago
- Atomic Red Team App for Phantom☆16Jul 7, 2020Updated 5 years ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- 个人使用的一款脚本提权扫描器☆19Sep 6, 2020Updated 5 years ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆37Feb 6, 2026Updated last month
- 集成快速端口扫描服务识别和暴力破解☆43Oct 9, 2020Updated 5 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- ☆39Nov 25, 2025Updated 3 months ago
- ☆18Oct 21, 2016Updated 9 years ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Creating a ransomware in a minute☆30Apr 25, 2023Updated 2 years ago
- Lateralus is terminal based phishing campaign tool☆28Feb 25, 2023Updated 3 years ago
- PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)☆89Jun 2, 2020Updated 5 years ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆92Aug 3, 2025Updated 7 months ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- A basic proxylogon scanner☆27Aug 11, 2021Updated 4 years ago
- Jenkins凭据解密脚本,增加对publish_over_ssh插件支持☆54Sep 23, 2020Updated 5 years ago
- Detect firearm and nudity on Twitter and Instagram☆14Mar 27, 2019Updated 6 years ago
- Impacket is a collection of Python classes for working with network protocols.☆31Jun 27, 2024Updated last year
- ☆36May 27, 2024Updated last year
- ☆10Sep 11, 2021Updated 4 years ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 7 months ago
- 网络渗透侦测平台,start~☆23May 26, 2020Updated 5 years ago
- shiro反序列化检测(只是个玩具23333)☆10Jan 16, 2024Updated 2 years ago