alpha1ab / Win2016LPE
Windows10 & Windows Server 2016 LPE Exploit (use schedsvc!SchRpcSetSecurity())
☆102Updated 5 years ago
Related projects: ⓘ
- it works on xp (all version sp2 sp3)☆74Updated 4 years ago
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆184Updated 4 years ago
- ☆40Updated this week
- a mini tool to dump password and NTLM hash from WDigest & MSV1_0 & tspkg, as a result of study of mimikatz☆76Updated 5 years ago
- ☆60Updated this week
- ☆52Updated 5 years ago
- ☆94Updated this week
- ☆127Updated 5 years ago
- a collection of webshell☆44Updated 6 years ago
- mstsc.exe Path Traversal to RCE POC☆90Updated 5 years ago
- Apache Solr DataImport Handler RCE☆88Updated 5 years ago
- ☆77Updated 6 years ago
- Zimbra XXE+SSRF+UPLOAD Poc☆59Updated 5 years ago
- ☆57Updated this week
- ☆88Updated 4 years ago
- Some debug notes and exploit(not blind)☆40Updated 5 years ago
- ☆39Updated this week
- CVE-2020-0688 - Exchange☆67Updated 4 years ago
- ☆139Updated this week
- PowerShell Obfuscator☆16Updated 6 years ago
- Shell say no to NIDS☆71Updated 4 years ago
- a pass-the-hash tool☆107Updated 6 years ago
- ☆30Updated 5 years ago
- ☆93Updated 3 years ago
- ☆23Updated 4 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆135Updated 4 years ago
- cobalt strike 自启动脚本☆70Updated 8 years ago
- 可以直接反弹shell☆47Updated last year
- ☆65Updated this week
- CVE-2017-7269 to webshell or shellcode loader☆86Updated 7 years ago