balki97 / OWASSRF-CVE-2022-41082-POCLinks
PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers
☆93Updated 2 years ago
Alternatives and similar repositories for OWASSRF-CVE-2022-41082-POC
Users that are interested in OWASSRF-CVE-2022-41082-POC are comparing it to the libraries listed below
Sorting:
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆89Updated 2 years ago
- POC for RCE using vulnerabilities described in VMSA-2023-0001☆149Updated 2 years ago
- Go implementation of the self-deletion of an running executable from disk☆113Updated 2 years ago
- CobaltStrike 4.0 - 4.5 Patch☆178Updated 2 years ago
- Take a screenshot without injection for Cobalt Strike☆197Updated 2 years ago
- the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An aut…☆34Updated 2 years ago
- Cobalt Strike AggressorScripts For Red Team☆154Updated 4 years ago
- C2 redirector base on caddy☆205Updated last year
- ☆154Updated 3 years ago
- ☆101Updated 2 years ago
- ☆47Updated 3 years ago
- 将PE文件进行AES加密,然后从远程拉取加载内存中实现免杀☆36Updated 2 years ago
- 👻Stowaway -- Multi-hop Proxy Tool for pentesters☆119Updated 3 years ago
- 通过WindowsAPI获取用户凭证,并保存到文件中☆194Updated last year
- Apache Solr Backup/Restore APIs RCE Poc (CVE-2023-50386)☆64Updated last year
- Cobalt Strike BOF that Add an admin user☆77Updated 2 years ago
- Shellcode Reductio Entropy Tools☆71Updated last year
- If you only have hash, you can still operate exchange☆75Updated 3 years ago
- CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行☆91Updated last year
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆78Updated 2 years ago
- Java JNI HellsGate/HalosGate/TartarusGate/RecycledGate/SSN Syscall/Many Shellcode Loaders☆196Updated 2 years ago
- CVE-2022-41040 - Server Side Request Forgery (SSRF) in Microsoft Exchange Server☆90Updated 2 years ago
- CobaltStrike Malleable Profile☆23Updated 3 years ago
- The Poc for CVE-2024-20931☆73Updated last year
- cve-2022-23131 zabbix-saml-bypass-exp☆152Updated 11 months ago
- A BeaconEye implement in Golang. It is used to detect the cobaltstrike beacon from memory and extract some configuration.☆161Updated 2 years ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆385Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆58Updated 3 years ago
- CobaltStrike and Google Auth twice☆65Updated 3 years ago
- Some Attacks of Exchange SSRF ProxyLogon&ProxyShell☆166Updated 3 years ago