at0mik / CVE-2019-0708-PoCLinks
CVE-2019-0708-PoC It is a semi-functional exploit capable of remotely accessing a Windows computer by exploiting the aforementioned vulnerability, this repository also contains notes on how to complete the attack.
☆17Updated 3 years ago
Alternatives and similar repositories for CVE-2019-0708-PoC
Users that are interested in CVE-2019-0708-PoC are comparing it to the libraries listed below
Sorting:
- PoC exploits for CVE-2020-17382☆114Updated 4 years ago
- ☆30Updated 6 years ago
- server2012-Group-policy-RCE☆47Updated 5 years ago
- ShellCode Loader for MSF and Cobalt Strike☆55Updated last year
- JScript RAT☆101Updated 4 years ago
- (Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that…☆43Updated 5 years ago
- cve-2019-0604 SharePoint RCE exploit☆100Updated 5 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆34Updated 4 years ago
- proxylogon exploit - CVE-2021-26857☆113Updated 4 years ago
- gui uac bypass (netplwiz.exe)☆66Updated 5 years ago
- New Found 0-days!☆36Updated 5 years ago
- CVE-2019-1458 Windows LPE Exploit☆135Updated 5 years ago
- Play Doh Windows ACL Tools☆62Updated 2 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆58Updated 7 years ago
- Cobalt Strike AggressorScripts CVE-2020-0796☆78Updated 4 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated 2 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 4 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆95Updated 4 years ago
- Exchange2010 authorized RCE☆156Updated 4 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Updated 5 years ago
- Use to check the valid account of the Remote Desktop Protocol(Support plaintext and ntlmhash)☆165Updated 5 years ago
- Zimbra邮件系统漏洞 XXE/RCE/SSRF/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)☆74Updated 2 years ago
- ClamAV_0Day_exploit☆89Updated 5 years ago
- a patched sshd for red team activities☆81Updated 3 years ago
- Security Support Provider Interface☆46Updated 5 years ago
- A collection of C# tools for various purposes (kerberoasting, tickets, mimikatz, privesc, domain enumeration and more)☆78Updated 5 years ago
- SQL Server Management Studio(SSMS) saved password dumper☆114Updated 2 years ago
- Use Waitfor.exe to maintain persistence☆54Updated 4 years ago
- guest→system(UAC手动提权)☆74Updated 5 years ago
- C# loader for msfvenom shellcode with AMSI bypass☆34Updated 4 years ago