☆144Mar 27, 2023Updated 3 years ago
Alternatives and similar repositories for CVE-2020-15778
Users that are interested in CVE-2020-15778 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆124Jul 30, 2020Updated 5 years ago
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆337Dec 23, 2021Updated 4 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆107May 25, 2020Updated 5 years ago
- Exploit for CVE-2020-3952 in vCenter 6.7☆278Apr 16, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- CVE-2019-0230 Exploit☆34Aug 13, 2020Updated 5 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆187Jun 17, 2020Updated 5 years ago
- 渗透技术栈☆19May 28, 2019Updated 6 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- cve-2020-0688☆328Jul 4, 2023Updated 2 years ago
- PoC for Zerologon - all research credits go to Tom Tervoort of Secura☆1,288Nov 3, 2020Updated 5 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,455Dec 18, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆447Sep 7, 2022Updated 3 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆170Jun 16, 2022Updated 3 years ago
- ☆63Sep 10, 2019Updated 6 years ago
- CVE-2018-13379☆254Aug 14, 2019Updated 6 years ago
- Burp Extension to manipulate AES encrypted payloads☆13Feb 4, 2022Updated 4 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Aug 25, 2020Updated 5 years ago
- ☆127Oct 28, 2021Updated 4 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Jan 26, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆34Apr 16, 2022Updated 3 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 4 years ago
- CVE-2020-0796 Remote Code Execution POC☆573Jun 9, 2020Updated 5 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆270Mar 18, 2021Updated 5 years ago
- CVE-2020-0796 Local Privilege Escalation POC☆245Apr 2, 2020Updated 6 years ago
- Collection of VBA macro published in our twitter / blog☆157Sep 5, 2022Updated 3 years ago
- ☆1,386Jul 2, 2020Updated 5 years ago
- 用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞☆52May 21, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- CVE-2021-27928 MariaDB/MySQL-'wsrep provider' 命令注入漏洞☆63Jun 29, 2023Updated 2 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- Challenges and vulnerabilities exploitation.☆60Dec 26, 2020Updated 5 years ago
- A small reverse shell for Linux & Windows☆636Jun 5, 2024Updated last year
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,351Dec 7, 2020Updated 5 years ago
- ☆475Sep 6, 2023Updated 2 years ago