cbwang505 / CVE-2020-1066-EXPView external linksLinks
CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统
☆187Jun 17, 2020Updated 5 years ago
Alternatives and similar repositories for CVE-2020-1066-EXP
Users that are interested in CVE-2020-1066-EXP are comparing it to the libraries listed below
Sorting:
- Support ALL Windows Version☆722Sep 11, 2020Updated 5 years ago
- ☆159Aug 4, 2020Updated 5 years ago
- ☆286Jan 15, 2020Updated 6 years ago
- WINDOWS TELEMETRY权限维持☆258Jul 2, 2020Updated 5 years ago
- Exploit and detect tools for CVE-2020-0688☆356Mar 21, 2020Updated 5 years ago
- CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell☆321Jan 21, 2020Updated 6 years ago
- ☆1,376Jul 2, 2020Updated 5 years ago
- 修改的SweetPotato,使之可以用于CobaltStrike v4.0☆246Apr 30, 2020Updated 5 years ago
- Cobalt Strike插件 - RDP日志取证&清除☆363Dec 23, 2019Updated 6 years ago
- Exploit for CVE-2020-3952 in vCenter 6.7☆275Apr 16, 2020Updated 5 years ago
- PoC for CVE-2020-1015☆39May 16, 2020Updated 5 years ago
- Behinder3.0 Beta4 源码(Decompile and Fixed)☆206Sep 1, 2020Updated 5 years ago
- WarSQLKit is a fileless rootkit and attack tool I developed for MS-SQL. With this tool you can rootkit the SQL service that uses CLR on M…☆262Dec 19, 2023Updated 2 years ago
- This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.☆226May 15, 2020Updated 5 years ago
- Exchange2010 authorized RCE☆157Dec 24, 2020Updated 5 years ago
- reGeorg的特殊版本,适用于老版本weblogic。☆151Apr 30, 2020Updated 5 years ago
- Steal privileged token to obtain SYSTEM shell☆252Jul 14, 2020Updated 5 years ago
- 利用NTLM Hash读取Exchange邮件☆441Jan 7, 2025Updated last year
- SharpAddDomainMachine☆69Oct 12, 2021Updated 4 years ago
- mstsc.exe Path Traversal to RCE POC☆91May 23, 2019Updated 6 years ago
- fastjson 1.2.68 版本 autotype bypass☆142Jun 17, 2022Updated 3 years ago
- tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484…☆212May 19, 2020Updated 5 years ago
- weaponized tool for CVE-2020-17144☆159Dec 9, 2020Updated 5 years ago
- PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)☆89Jun 2, 2020Updated 5 years ago
- 将shellcode用rsa加密并动态编译exe,自带几种反沙箱技术。☆521Jul 9, 2020Updated 5 years ago
- 内网渗透中常用的c#程序整合成cs脚本,直接内存加载。持续更新~☆498Feb 13, 2020Updated 6 years ago
- 基于亚马逊S3\阿里云OSS\腾讯COS通信隧道的远程管理工具☆327Oct 10, 2020Updated 5 years ago
- OXID_Find by C++(多线程) 通过OXID解析器获取Windows远程主机上网卡地址☆86Jul 19, 2020Updated 5 years ago
- 一款基于webshell命令执行功能实现的GUI webshell管理工具,支持流量加密☆218Jun 4, 2021Updated 4 years ago
- 窃取mstsc中的用户明文凭据☆47Apr 23, 2021Updated 4 years ago
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆338Dec 23, 2021Updated 4 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆85Jun 17, 2020Updated 5 years ago
- 读取登录过本机的登录失败或登录成功的所有计算机信息,在内网渗透中快速定位运维管理人员。☆221Sep 30, 2019Updated 6 years ago
- sharpwmi是一个基于rpc的横向移动工具,具有上传文件和执行命令功能。☆717Aug 3, 2021Updated 4 years ago
- Weblogic IIOP CVE-2020-2551☆340Apr 7, 2020Updated 5 years ago
- cve-2020-0688☆330Jul 4, 2023Updated 2 years ago
- Weblogic coherence.jar RCE☆176May 10, 2020Updated 5 years ago
- CobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon,其中包括正常上线、文件管理、进程管理、令牌管理、结合SysCall进行注入、原生 端口转发、关ETW等一系列功能☆731Sep 1, 2021Updated 4 years ago
- Modifying SweetPotato to support load shellcode and webshell☆788Jun 2, 2021Updated 4 years ago