cpandya2909 / CVE-2020-15778View external linksLinks
☆144Mar 27, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2020-15778
Users that are interested in CVE-2020-15778 are comparing it to the libraries listed below
Sorting:
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆125Jul 30, 2020Updated 5 years ago
- Exploit for CVE-2020-3952 in vCenter 6.7☆275Apr 16, 2020Updated 5 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106May 25, 2020Updated 5 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- cve-2020-0688☆330Jul 4, 2023Updated 2 years ago
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆338Dec 23, 2021Updated 4 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆169Jun 16, 2022Updated 3 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,438Dec 18, 2022Updated 3 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- PE Crypter written in Nim☆101Mar 25, 2021Updated 4 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆269Mar 18, 2021Updated 4 years ago
- PoC for Zerologon - all research credits go to Tom Tervoort of Secura☆1,277Nov 3, 2020Updated 5 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆187Jun 17, 2020Updated 5 years ago
- A small reverse shell for Linux & Windows☆625Jun 5, 2024Updated last year
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- Windows active user credential phishing tool☆283Mar 10, 2020Updated 5 years ago
- Leghorn code for PKI abuse☆32Jun 17, 2021Updated 4 years ago
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Apr 7, 2021Updated 4 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- This is a PowerShell Empire launcher PoC using PrintDemon and Faxhell.☆202Oct 17, 2020Updated 5 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆445Sep 7, 2022Updated 3 years ago
- ☆1,376Jul 2, 2020Updated 5 years ago
- .NET 4.0 Project to interact with video, audio and keyboard hardware.☆220Sep 27, 2019Updated 6 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,348Dec 7, 2020Updated 5 years ago
- Collection of VBA macro published in our twitter / blog☆158Sep 5, 2022Updated 3 years ago
- A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating sys…☆492Jul 23, 2020Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago
- MSIX Building Made Easy for Defenders☆59Aug 25, 2025Updated 5 months ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Nov 29, 2020Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Jun 10, 2023Updated 2 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Aug 25, 2020Updated 5 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆224Dec 5, 2020Updated 5 years ago
- CVE-2020-0796 Remote Code Execution POC☆571Jun 9, 2020Updated 5 years ago