adhikara13 / CVE-2023-24489-ShareFileLinks
This project is a Python script that exploits the CVE-2023-24489 vulnerability in ShareFile. It allows remote command execution on the target server. The script supports both Windows and Linux (On testing) platforms, and it can be used to exploit individual targets or perform mass checking on a list of URLs.
☆12Updated 2 years ago
Alternatives and similar repositories for CVE-2023-24489-ShareFile
Users that are interested in CVE-2023-24489-ShareFile are comparing it to the libraries listed below
Sorting:
- ☆19Updated 3 years ago
- Tomcat backdoor based on CS blog☆27Updated 2 years ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆21Updated 3 years ago
- A testing Red Team Infrastructure created with Docker☆32Updated 3 years ago
- ManageEngine ADManager Command Injection☆11Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆27Updated 3 years ago
- ownCloud exploits for CVE-2023-49105☆36Updated last year
- Cobalt Strike Aggressor script create for RTO☆16Updated last year
- Simple shellcode injection in Nim encrypted in XOR☆22Updated 2 years ago
- ☆53Updated 3 years ago
- Ntdll Unhooking POC☆19Updated 3 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆28Updated 2 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆26Updated 4 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Updated 4 years ago
- CVE-2025-31324, SAP Exploit☆22Updated 5 months ago
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Updated 10 months ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆24Updated 9 months ago
- Beacon Object Files.☆37Updated last year
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Updated 3 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 4 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Updated 3 years ago
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago
- AutoStart teamserver and listeners with services☆74Updated 3 years ago
- Manual Map Your Files, Bypass 100% Runtime.☆11Updated 3 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Updated 3 years ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆40Updated 2 months ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆19Updated 5 years ago
- Windows Oracle Database Attack Toolkit☆80Updated 3 years ago
- ☆10Updated 2 years ago
- Zimbra CVE-2022-37042 Nuclei weaponized template☆20Updated 3 years ago