chebuya / Havoc-C2-SSRF-pocLinks
CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit
☆75Updated 9 months ago
Alternatives and similar repositories for Havoc-C2-SSRF-poc
Users that are interested in Havoc-C2-SSRF-poc are comparing it to the libraries listed below
Sorting:
- PoCs of RCEs against open source C2 servers☆83Updated 8 months ago
- CVE-2023-2255 Libre Office☆58Updated last year
- TeamServer and Client of Exploration Command and Control Framework☆131Updated 3 weeks ago
- ☆41Updated last week
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆255Updated 10 months ago
- PoC for the ThemeBleed Windows 11 CVE-2023-38146 written in python using impacket. https://jnns.de/posts/cve-2023-38146-poc/☆20Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆73Updated 10 months ago
- ☆88Updated 5 months ago
- ☆154Updated 11 months ago
- Active Directory Authentication Library☆74Updated 2 weeks ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆155Updated last week
- ☆136Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆115Updated 2 months ago
- ☆67Updated 5 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆206Updated last year
- Windows Privilege Escalation☆64Updated 3 years ago
- Precompiled executable☆58Updated 4 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆97Updated 2 months ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆194Updated 7 months ago
- Windows Privilege Escalation☆17Updated 3 years ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆71Updated last year
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆166Updated 2 weeks ago
- psexecsvc - a python implementation of PSExec's native service implementation☆201Updated 4 months ago
- Attempt at Obfuscated version of SharpCollection☆216Updated 3 weeks ago
- Use ESC1 to perform a makeshift DCSync and dump hashes☆209Updated last year
- Continuous password spraying tool☆189Updated 3 months ago
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆88Updated 7 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆201Updated 8 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆141Updated 5 months ago
- ☆164Updated last year