cowbe0x004 / eximrce-CVE-2019-10149
simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.
☆13Updated 5 years ago
Related projects: ⓘ
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Updated 5 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- PoC for CVE-2020-11651☆6Updated 4 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆30Updated 9 years ago
- Burp extension for automated handling of CSRF tokens☆15Updated 6 years ago
- C# Situational Awareness Script☆34Updated 5 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- CVE-2020-12828 PoC and Analysis.☆28Updated 4 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- Asynchronous MSF RPC API wrapper☆20Updated last year
- Useful Windows and AD tools☆15Updated 2 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 3 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 3 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆15Updated 3 months ago
- Zoho ManageEngine Desktop Central CVEs☆15Updated 3 years ago
- PoC ActiveX SVG Document Execution☆21Updated 5 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆17Updated 5 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Updated 5 years ago
- Abusing SketchUp to make persistence on Windows☆19Updated 5 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆38Updated 4 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Updated 2 years ago
- ☆21Updated this week
- CVE-2019-12949☆26Updated 5 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆34Updated 4 years ago
- ☆20Updated this week
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- Simulates a logged in user.☆16Updated 2 months ago
- Working exploit code for CVE-2019-17625☆17Updated 4 years ago